<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2021:1573-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-05-12T10:03:17Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-05-12T10:03:17Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-05-12T10:03:17Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-36312: Fixed an issue in virt/kvm/kvm_main.c that had a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure (bnc#1184509).
- CVE-2021-29650: Fixed an issue inside the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).
- CVE-2021-29155: Fixed an issue within kernel/bpf/verifier.c that performed undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations (bnc#1184942).
- CVE-2020-36310: Fixed an issue in arch/x86/kvm/svm/svm.c that allowed a set_memory_region_test infinite loop for certain nested page faults (bnc#1184512).
- CVE-2020-27673: Fixed an issue in Xen where a guest OS users could have caused a denial of service (host OS hang) via a high rate of events to dom0 (bnc#1177411, bnc#1184583).
- CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bnc#1184391).
- CVE-2020-25673: Fixed NFC endless loops caused by repeated llcp_sock_connect() (bsc#1178181).
- CVE-2020-25672: Fixed NFC memory leak in llcp_sock_connect() (bsc#1178181).
- CVE-2020-25671: Fixed NFC refcount leak in llcp_sock_connect() (bsc#1178181).
- CVE-2020-25670: Fixed NFC refcount leak in llcp_sock_bind() (bsc#1178181).
- CVE-2020-36311: Fixed an issue in arch/x86/kvm/svm/sev.c that allowed attackers to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions) (bnc#1184511).
- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h where a 'stall on CPU' could have occured because a retry loop continually finds the same bad inode (bnc#1184194, bnc#1184211).
- CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bnc#1184211).
- CVE-2021-30002: Fixed a memory leak issue when a webcam device exists (bnc#1184120).
- CVE-2021-3483: Fixed a use-after-free bug in nosy_ioctl() (bsc#1184393).
- CVE-2021-20219: Fixed a denial of service vulnerability in drivers/tty/n_tty.c of the Linux kernel. In this flaw a local attacker with a normal user privilege could have delayed the loop and cause a threat to the system availability (bnc#1184397).
- CVE-2021-28964: Fixed a race condition in fs/btrfs/ctree.c that could have caused a denial of service because of a lack of locking on an extent buffer before a cloning operation (bnc#1184193).
- CVE-2021-3444: Fixed the bpf verifier as it did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution (bnc#1184170).
- CVE-2021-28971: Fixed a potential local denial of service in intel_pmu_drain_pebs_nhm where userspace applications can cause a system crash because the PEBS status in a PEBS record is mishandled (bnc#1184196).
- CVE-2021-28688: Fixed XSA-365 that includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains (bnc#1183646).
- CVE-2021-29265: Fixed an issue in usbip_sockfd_store in drivers/usb/usbip/stub_dev.c that allowed attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status (bnc#1184167).
- CVE-2021-29264: Fixed an issue in drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver that allowed attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled (bnc#1184168).
- CVE-2021-28972: Fixed an issue in drivers/pci/hotplug/rpadlpar_sysfs.c where the RPA PCI Hotplug driver had a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\0' termination (bnc#1184198).
- CVE-2021-29647: Fixed an issue in kernel qrtr_recvmsg in net/qrtr/qrtr.c that allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bnc#1184192).
- CVE-2020-27171: Fixed an issue in kernel/bpf/verifier.c that had an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bnc#1183686, bnc#1183775).
- CVE-2020-27170: Fixed an issue in kernel/bpf/verifier.c that performed undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. This affects pointer types that do not define a ptr_limit (bnc#1183686 bnc#1183775).
- CVE-2021-28660: Fixed rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c that allowed writing beyond the end of the ssid array (bnc#1183593).
- CVE-2020-35519: Update patch reference for x25 fix (bsc#1183696).
- CVE-2021-3428: Fixed ext4 integer overflow in ext4_es_cache_extent (bsc#1173485, bsc#1183509).
- CVE-2020-0433: Fixed blk_mq_queue_tag_busy_iter of blk-mq-tag.c, where a possible use after free due to improper locking could have happened. This could have led to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1176720).
- CVE-2021-28038: Fixed an issue with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931 (bnc#1183022, bnc#1183069).
- CVE-2020-27815: Fixed jfs array index bounds check in dbAdjTree (bsc#1179454).
- CVE-2021-27365: Fixed an issue inside the iSCSI data structures that does not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bnc#1182715).
- CVE-2021-27363: Fixed an issue with a kernel pointer leak that could have been used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables (bnc#1182716).
- CVE-2021-27364: Fixed an issue in drivers/scsi/scsi_transport_iscsi.c where an unprivileged user can craft Netlink messages (bnc#1182717).

The following non-security bugs were fixed:

- Revert 'rpm/kernel-binary.spec.in: Fix dependency of kernel-*-devel package (bsc#1184514)' This turned out to be a bad idea: the kernel-$flavor-devel package must be usable without kernel-$flavor, e.g. at the build of a KMP. And this change brought superfluous installation of kernel-preempt when a system had kernel-syms (bsc#1185113).
- Xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367).
- bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).
- bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).
- ext4: check journal inode extents more carefully (bsc#1173485).
- ext4: do not allow overlapping system zones (bsc#1173485).
- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).
- hv: clear ring_buffer pointer during cleanup (part of ae6935ed) (bsc#1181032).
- hv_netvsc: remove ndo_poll_controller (bsc#1185248).
- macros.kernel-source: Use spec_install_pre for certificate installation (boo#1182672). 
- post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388).
- rpm/kernel-binary.spec.in: Fix dependency of kernel-*-devel package (bsc#1184514).
- rpm/kernel-obs-build.spec.in: Include essiv with dm-crypt (boo#1183063).
- rpm/kernel-subpackage-build: Workaround broken bot (https://github.com/openSUSE/openSUSE-release-tools/issues/2439)
- rpm/macros.kernel-source: fix KMP failure in %install (bsc#1185244)
- rpm/mkspec: Use tilde instead of dot for version string with rc (bsc#1184650)
- xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2021-1573,SUSE-SLE-Module-Live-Patching-15-2021-1573,SUSE-SLE-Product-HA-15-2021-1573,SUSE-SLE-Product-HPC-15-2021-1573,SUSE-SLE-Product-SLES-15-2021-1573,SUSE-SLE-Product-SLES_SAP-15-2021-1573</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      <Description>Link for SUSE-SU-2021:1573-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html</URL>
      <Description>E-Mail link for SUSE-SU-2021:1573-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1047233</URL>
      <Description>SUSE Bug 1047233</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173485</URL>
      <Description>SUSE Bug 1173485</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176720</URL>
      <Description>SUSE Bug 1176720</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177411</URL>
      <Description>SUSE Bug 1177411</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178181</URL>
      <Description>SUSE Bug 1178181</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179454</URL>
      <Description>SUSE Bug 1179454</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1181032</URL>
      <Description>SUSE Bug 1181032</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1182672</URL>
      <Description>SUSE Bug 1182672</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1182715</URL>
      <Description>SUSE Bug 1182715</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1182716</URL>
      <Description>SUSE Bug 1182716</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1182717</URL>
      <Description>SUSE Bug 1182717</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1183022</URL>
      <Description>SUSE Bug 1183022</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1183063</URL>
      <Description>SUSE Bug 1183063</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1183069</URL>
      <Description>SUSE Bug 1183069</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1183509</URL>
      <Description>SUSE Bug 1183509</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1183593</URL>
      <Description>SUSE Bug 1183593</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1183646</URL>
      <Description>SUSE Bug 1183646</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1183686</URL>
      <Description>SUSE Bug 1183686</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1183696</URL>
      <Description>SUSE Bug 1183696</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1183775</URL>
      <Description>SUSE Bug 1183775</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184120</URL>
      <Description>SUSE Bug 1184120</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184167</URL>
      <Description>SUSE Bug 1184167</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184168</URL>
      <Description>SUSE Bug 1184168</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184170</URL>
      <Description>SUSE Bug 1184170</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184192</URL>
      <Description>SUSE Bug 1184192</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184193</URL>
      <Description>SUSE Bug 1184193</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184194</URL>
      <Description>SUSE Bug 1184194</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184196</URL>
      <Description>SUSE Bug 1184196</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184198</URL>
      <Description>SUSE Bug 1184198</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184208</URL>
      <Description>SUSE Bug 1184208</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184211</URL>
      <Description>SUSE Bug 1184211</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184388</URL>
      <Description>SUSE Bug 1184388</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184391</URL>
      <Description>SUSE Bug 1184391</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184393</URL>
      <Description>SUSE Bug 1184393</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184397</URL>
      <Description>SUSE Bug 1184397</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184509</URL>
      <Description>SUSE Bug 1184509</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184511</URL>
      <Description>SUSE Bug 1184511</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184512</URL>
      <Description>SUSE Bug 1184512</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184514</URL>
      <Description>SUSE Bug 1184514</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184583</URL>
      <Description>SUSE Bug 1184583</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184650</URL>
      <Description>SUSE Bug 1184650</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184942</URL>
      <Description>SUSE Bug 1184942</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185113</URL>
      <Description>SUSE Bug 1185113</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185244</URL>
      <Description>SUSE Bug 1185244</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185248</URL>
      <Description>SUSE Bug 1185248</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-0433/</URL>
      <Description>SUSE CVE CVE-2020-0433 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25670/</URL>
      <Description>SUSE CVE CVE-2020-25670 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25671/</URL>
      <Description>SUSE CVE CVE-2020-25671 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25672/</URL>
      <Description>SUSE CVE CVE-2020-25672 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25673/</URL>
      <Description>SUSE CVE CVE-2020-25673 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27170/</URL>
      <Description>SUSE CVE CVE-2020-27170 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27171/</URL>
      <Description>SUSE CVE CVE-2020-27171 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27673/</URL>
      <Description>SUSE CVE CVE-2020-27673 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27815/</URL>
      <Description>SUSE CVE CVE-2020-27815 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-35519/</URL>
      <Description>SUSE CVE CVE-2020-35519 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-36310/</URL>
      <Description>SUSE CVE CVE-2020-36310 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-36311/</URL>
      <Description>SUSE CVE CVE-2020-36311 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-36312/</URL>
      <Description>SUSE CVE CVE-2020-36312 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-36322/</URL>
      <Description>SUSE CVE CVE-2020-36322 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-20219/</URL>
      <Description>SUSE CVE CVE-2021-20219 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-27363/</URL>
      <Description>SUSE CVE CVE-2021-27363 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-27364/</URL>
      <Description>SUSE CVE CVE-2021-27364 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-27365/</URL>
      <Description>SUSE CVE CVE-2021-27365 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-28038/</URL>
      <Description>SUSE CVE CVE-2021-28038 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-28660/</URL>
      <Description>SUSE CVE CVE-2021-28660 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-28688/</URL>
      <Description>SUSE CVE CVE-2021-28688 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-28950/</URL>
      <Description>SUSE CVE CVE-2021-28950 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-28964/</URL>
      <Description>SUSE CVE CVE-2021-28964 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-28971/</URL>
      <Description>SUSE CVE CVE-2021-28971 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-28972/</URL>
      <Description>SUSE CVE CVE-2021-28972 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29154/</URL>
      <Description>SUSE CVE CVE-2021-29154 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29155/</URL>
      <Description>SUSE CVE CVE-2021-29155 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29264/</URL>
      <Description>SUSE CVE CVE-2021-29264 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29265/</URL>
      <Description>SUSE CVE CVE-2021-29265 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29647/</URL>
      <Description>SUSE CVE CVE-2021-29647 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29650/</URL>
      <Description>SUSE CVE CVE-2021-29650 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30002/</URL>
      <Description>SUSE CVE CVE-2021-30002 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3428/</URL>
      <Description>SUSE CVE CVE-2021-3428 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3444/</URL>
      <Description>SUSE CVE CVE-2021-3444 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3483/</URL>
      <Description>SUSE CVE CVE-2021-3483 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Availability Extension 15">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Availability Extension 15">
        <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15" CPE="cpe:/o:suse:sle-ha:15">SUSE Linux Enterprise High Availability Extension 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15-ESPOS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15-ESPOS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-ESPOS" CPE="cpe:/o:suse:sle_hpc-espos:15">SUSE Linux Enterprise High Performance Computing 15-ESPOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-LTSS" CPE="cpe:/o:suse:sle_hpc-ltss:15">SUSE Linux Enterprise High Performance Computing 15-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 15">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 15">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15" CPE="cpe:/o:suse:sle-module-live-patching:15">SUSE Linux Enterprise Live Patching 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15-LTSS" CPE="cpe:/o:suse:sles-ltss:15">SUSE Linux Enterprise Server 15-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15" CPE="cpe:/o:suse:sles_sap:15">SUSE Linux Enterprise Server for SAP Applications 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="cluster-md-kmp-default-4.12.14-150.72.1">
      <FullProductName ProductID="cluster-md-kmp-default-4.12.14-150.72.1">cluster-md-kmp-default-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dlm-kmp-default-4.12.14-150.72.1">
      <FullProductName ProductID="dlm-kmp-default-4.12.14-150.72.1">dlm-kmp-default-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gfs2-kmp-default-4.12.14-150.72.1">
      <FullProductName ProductID="gfs2-kmp-default-4.12.14-150.72.1">gfs2-kmp-default-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-debug-4.12.14-150.72.1">kernel-debug-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-base-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-debug-base-4.12.14-150.72.1">kernel-debug-base-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-devel-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-debug-devel-4.12.14-150.72.1">kernel-debug-devel-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-livepatch-devel-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-debug-livepatch-devel-4.12.14-150.72.1">kernel-debug-livepatch-devel-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-default-4.12.14-150.72.1">kernel-default-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-default-base-4.12.14-150.72.1">kernel-default-base-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-default-devel-4.12.14-150.72.1">kernel-default-devel-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-extra-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-default-extra-4.12.14-150.72.1">kernel-default-extra-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-livepatch-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-default-livepatch-4.12.14-150.72.1">kernel-default-livepatch-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-livepatch-devel-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-default-livepatch-devel-4.12.14-150.72.1">kernel-default-livepatch-devel-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-man-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-default-man-4.12.14-150.72.1">kernel-default-man-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-devel-4.12.14-150.72.1">kernel-devel-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-4.12.14-150.72.2">
      <FullProductName ProductID="kernel-docs-4.12.14-150.72.2">kernel-docs-4.12.14-150.72.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-html-4.12.14-150.72.2">
      <FullProductName ProductID="kernel-docs-html-4.12.14-150.72.2">kernel-docs-html-4.12.14-150.72.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-kvmsmall-4.12.14-150.72.1">kernel-kvmsmall-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-base-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-kvmsmall-base-4.12.14-150.72.1">kernel-kvmsmall-base-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-devel-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-kvmsmall-devel-4.12.14-150.72.1">kernel-kvmsmall-devel-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-livepatch-devel-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-kvmsmall-livepatch-devel-4.12.14-150.72.1">kernel-kvmsmall-livepatch-devel-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-livepatch-4_12_14-150_72-default-1-1.3.1">
      <FullProductName ProductID="kernel-livepatch-4_12_14-150_72-default-1-1.3.1">kernel-livepatch-4_12_14-150_72-default-1-1.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-macros-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-macros-4.12.14-150.72.1">kernel-macros-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-build-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-obs-build-4.12.14-150.72.1">kernel-obs-build-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-qa-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-obs-qa-4.12.14-150.72.1">kernel-obs-qa-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-source-4.12.14-150.72.1">kernel-source-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-vanilla-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-source-vanilla-4.12.14-150.72.1">kernel-source-vanilla-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-syms-4.12.14-150.72.1">kernel-syms-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-vanilla-4.12.14-150.72.1">kernel-vanilla-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-base-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-vanilla-base-4.12.14-150.72.1">kernel-vanilla-base-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-devel-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-vanilla-devel-4.12.14-150.72.1">kernel-vanilla-devel-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-livepatch-devel-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-vanilla-livepatch-devel-4.12.14-150.72.1">kernel-vanilla-livepatch-devel-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-zfcpdump-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-zfcpdump-4.12.14-150.72.1">kernel-zfcpdump-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-zfcpdump-man-4.12.14-150.72.1">
      <FullProductName ProductID="kernel-zfcpdump-man-4.12.14-150.72.1">kernel-zfcpdump-man-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kselftests-kmp-default-4.12.14-150.72.1">
      <FullProductName ProductID="kselftests-kmp-default-4.12.14-150.72.1">kselftests-kmp-default-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ocfs2-kmp-default-4.12.14-150.72.1">
      <FullProductName ProductID="ocfs2-kmp-default-4.12.14-150.72.1">ocfs2-kmp-default-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="reiserfs-kmp-default-4.12.14-150.72.1">
      <FullProductName ProductID="reiserfs-kmp-default-4.12.14-150.72.1">reiserfs-kmp-default-4.12.14-150.72.1</FullProductName>
    </Branch>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Availability Extension 15">
      <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1">cluster-md-kmp-default-4.12.14-150.72.1 as a component of SUSE Linux Enterprise High Availability Extension 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Availability Extension 15">
      <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1">dlm-kmp-default-4.12.14-150.72.1 as a component of SUSE Linux Enterprise High Availability Extension 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Availability Extension 15">
      <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1">gfs2-kmp-default-4.12.14-150.72.1 as a component of SUSE Linux Enterprise High Availability Extension 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Availability Extension 15">
      <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1">ocfs2-kmp-default-4.12.14-150.72.1 as a component of SUSE Linux Enterprise High Availability Extension 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1">kernel-default-4.12.14-150.72.1 as a component of SUSE Linux Enterprise High Performance Computing 15-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1">kernel-default-base-4.12.14-150.72.1 as a component of SUSE Linux Enterprise High Performance Computing 15-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1">kernel-default-devel-4.12.14-150.72.1 as a component of SUSE Linux Enterprise High Performance Computing 15-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1">kernel-devel-4.12.14-150.72.1 as a component of SUSE Linux Enterprise High Performance Computing 15-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-4.12.14-150.72.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2">kernel-docs-4.12.14-150.72.2 as a component of SUSE Linux Enterprise High Performance Computing 15-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1">kernel-macros-4.12.14-150.72.1 as a component of SUSE Linux Enterprise High Performance Computing 15-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-build-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1">kernel-obs-build-4.12.14-150.72.1 as a component of SUSE Linux Enterprise High Performance Computing 15-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1">kernel-source-4.12.14-150.72.1 as a component of SUSE Linux Enterprise High Performance Computing 15-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1">kernel-syms-4.12.14-150.72.1 as a component of SUSE Linux Enterprise High Performance Computing 15-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-vanilla-base-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1">kernel-vanilla-base-4.12.14-150.72.1 as a component of SUSE Linux Enterprise High Performance Computing 15-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1">kernel-default-4.12.14-150.72.1 as a component of SUSE Linux Enterprise High Performance Computing 15-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1">kernel-default-base-4.12.14-150.72.1 as a component of SUSE Linux Enterprise High Performance Computing 15-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1">kernel-default-devel-4.12.14-150.72.1 as a component of SUSE Linux Enterprise High Performance Computing 15-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1">kernel-devel-4.12.14-150.72.1 as a component of SUSE Linux Enterprise High Performance Computing 15-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-4.12.14-150.72.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2">kernel-docs-4.12.14-150.72.2 as a component of SUSE Linux Enterprise High Performance Computing 15-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1">kernel-macros-4.12.14-150.72.1 as a component of SUSE Linux Enterprise High Performance Computing 15-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-build-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1">kernel-obs-build-4.12.14-150.72.1 as a component of SUSE Linux Enterprise High Performance Computing 15-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1">kernel-source-4.12.14-150.72.1 as a component of SUSE Linux Enterprise High Performance Computing 15-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1">kernel-syms-4.12.14-150.72.1 as a component of SUSE Linux Enterprise High Performance Computing 15-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-vanilla-base-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1">kernel-vanilla-base-4.12.14-150.72.1 as a component of SUSE Linux Enterprise High Performance Computing 15-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-livepatch-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 15">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1">kernel-default-livepatch-4.12.14-150.72.1 as a component of SUSE Linux Enterprise Live Patching 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-livepatch-4_12_14-150_72-default-1-1.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 15">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1">kernel-livepatch-4_12_14-150_72-default-1-1.3.1 as a component of SUSE Linux Enterprise Live Patching 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1">kernel-default-4.12.14-150.72.1 as a component of SUSE Linux Enterprise Server 15-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1">kernel-default-base-4.12.14-150.72.1 as a component of SUSE Linux Enterprise Server 15-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1">kernel-default-devel-4.12.14-150.72.1 as a component of SUSE Linux Enterprise Server 15-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-man-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1">kernel-default-man-4.12.14-150.72.1 as a component of SUSE Linux Enterprise Server 15-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1">kernel-devel-4.12.14-150.72.1 as a component of SUSE Linux Enterprise Server 15-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-4.12.14-150.72.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2">kernel-docs-4.12.14-150.72.2 as a component of SUSE Linux Enterprise Server 15-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1">kernel-macros-4.12.14-150.72.1 as a component of SUSE Linux Enterprise Server 15-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-build-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1">kernel-obs-build-4.12.14-150.72.1 as a component of SUSE Linux Enterprise Server 15-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1">kernel-source-4.12.14-150.72.1 as a component of SUSE Linux Enterprise Server 15-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1">kernel-syms-4.12.14-150.72.1 as a component of SUSE Linux Enterprise Server 15-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-vanilla-base-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1">kernel-vanilla-base-4.12.14-150.72.1 as a component of SUSE Linux Enterprise Server 15-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="reiserfs-kmp-default-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1">reiserfs-kmp-default-4.12.14-150.72.1 as a component of SUSE Linux Enterprise Server 15-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1">kernel-default-4.12.14-150.72.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1">kernel-default-base-4.12.14-150.72.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1">kernel-default-devel-4.12.14-150.72.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1">kernel-devel-4.12.14-150.72.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-4.12.14-150.72.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2">kernel-docs-4.12.14-150.72.2 as a component of SUSE Linux Enterprise Server for SAP Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1">kernel-macros-4.12.14-150.72.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-build-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1">kernel-obs-build-4.12.14-150.72.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1">kernel-source-4.12.14-150.72.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1">kernel-syms-4.12.14-150.72.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-vanilla-base-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1">kernel-vanilla-base-4.12.14-150.72.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="reiserfs-kmp-default-4.12.14-150.72.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1">reiserfs-kmp-default-4.12.14-150.72.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15</FullProductName>
    </Relationship>
  </ProductTree>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In blk_mq_queue_tag_busy_iter of blk-mq-tag.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-151939299</Note>
    </Notes>
    <CVE>CVE-2020-0433</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>4.6</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:P/I:P/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>7.8</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-0433.html</URL>
        <Description>CVE-2020-0433</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176720</URL>
        <Description>SUSE Bug 1176720</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178066</URL>
        <Description>SUSE Bug 1178066</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1187135</URL>
        <Description>SUSE Bug 1187135</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189302</URL>
        <Description>SUSE Bug 1189302</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free which might lead to privilege escalations.</Note>
    </Notes>
    <CVE>CVE-2020-25670</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>7.2</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:C/I:C/A:C</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>7.8</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25670.html</URL>
        <Description>CVE-2020-25670</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178181</URL>
        <Description>SUSE Bug 1178181</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194680</URL>
        <Description>SUSE Bug 1194680</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations.</Note>
    </Notes>
    <CVE>CVE-2020-25671</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>7.2</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:C/I:C/A:C</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>5.5</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25671.html</URL>
        <Description>CVE-2020-25671</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178181</URL>
        <Description>SUSE Bug 1178181</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory leak vulnerability was found in Linux kernel in llcp_sock_connect</Note>
    </Notes>
    <CVE>CVE-2020-25672</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>5</BaseScoreV2>
        <VectorV2>AV:N/AC:L/Au:N/C:N/I:N/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>5.5</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25672.html</URL>
        <Description>CVE-2020-25672</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178181</URL>
        <Description>SUSE Bug 1178181</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system.</Note>
    </Notes>
    <CVE>CVE-2020-25673</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>4.9</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:N/I:N/A:C</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>6.1</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25673.html</URL>
        <Description>CVE-2020-25673</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178181</URL>
        <Description>SUSE Bug 1178181</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit.</Note>
    </Notes>
    <CVE>CVE-2020-27170</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>1.9</BaseScoreV2>
        <VectorV2>AV:L/AC:M/Au:N/C:P/I:N/A:N</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>4.7</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27170.html</URL>
        <Description>CVE-2020-27170</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183686</URL>
        <Description>SUSE Bug 1183686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183775</URL>
        <Description>SUSE Bug 1183775</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c has an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-10d2bb2e6b1d.</Note>
    </Notes>
    <CVE>CVE-2020-27171</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>3.6</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:P/I:N/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>6</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27171.html</URL>
        <Description>CVE-2020-27171</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183686</URL>
        <Description>SUSE Bug 1183686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183775</URL>
        <Description>SUSE Bug 1183775</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.</Note>
    </Notes>
    <CVE>CVE-2020-27673</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>4.9</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:N/I:N/A:C</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>6.2</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27673.html</URL>
        <Description>CVE-2020-27673</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177411</URL>
        <Description>SUSE Bug 1177411</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184583</URL>
        <Description>SUSE Bug 1184583</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2020-27815</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>6.1</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:P/I:P/A:C</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>7.4</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27815.html</URL>
        <Description>CVE-2020-27815</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179454</URL>
        <Description>SUSE Bug 1179454</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179458</URL>
        <Description>SUSE Bug 1179458</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2020-35519</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>6.8</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:C/I:P/A:C</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>7.8</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-35519.html</URL>
        <Description>CVE-2020-35519</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183696</URL>
        <Description>SUSE Bug 1183696</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184953</URL>
        <Description>SUSE Bug 1184953</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211495</URL>
        <Description>SUSE Bug 1211495</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel before 5.8. arch/x86/kvm/svm/svm.c allows a set_memory_region_test infinite loop for certain nested page faults, aka CID-e72436bc3a52.</Note>
    </Notes>
    <CVE>CVE-2020-36310</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>2.1</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:N/I:N/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>6.2</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-36310.html</URL>
        <Description>CVE-2020-36310</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184512</URL>
        <Description>SUSE Bug 1184512</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel before 5.9. arch/x86/kvm/svm/sev.c allows attackers to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions), aka CID-7be74942f184.</Note>
    </Notes>
    <CVE>CVE-2020-36311</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>2.1</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:N/I:N/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>4</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-36311.html</URL>
        <Description>CVE-2020-36311</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184511</URL>
        <Description>SUSE Bug 1184511</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel before 5.8.10. virt/kvm/kvm_main.c has a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure, aka CID-f65886606c2d.</Note>
    </Notes>
    <CVE>CVE-2020-36312</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>2.1</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:N/I:N/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>3.3</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-36312.html</URL>
        <Description>CVE-2020-36312</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184509</URL>
        <Description>SUSE Bug 1184509</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.</Note>
    </Notes>
    <CVE>CVE-2020-36322</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>4.9</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:N/I:N/A:C</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>7.7</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-36322.html</URL>
        <Description>CVE-2020-36322</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184211</URL>
        <Description>SUSE Bug 1184211</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184952</URL>
        <Description>SUSE Bug 1184952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189302</URL>
        <Description>SUSE Bug 1189302</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A denial of service vulnerability was found in n_tty_receive_char_special in drivers/tty/n_tty.c of the Linux kernel. In this flaw a local attacker with a normal user privilege could delay the loop (due to a changing ldata-&gt;read_head, and a missing sanity check) and cause a threat to the system availability.</Note>
    </Notes>
    <CVE>CVE-2021-20219</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>2.1</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:N/I:N/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>5.5</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-20219.html</URL>
        <Description>CVE-2021-20219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184397</URL>
        <Description>SUSE Bug 1184397</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables.</Note>
    </Notes>
    <CVE>CVE-2021-27363</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>3.6</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:P/I:N/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>7.1</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-27363.html</URL>
        <Description>CVE-2021-27363</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182716</URL>
        <Description>SUSE Bug 1182716</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182717</URL>
        <Description>SUSE Bug 1182717</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183120</URL>
        <Description>SUSE Bug 1183120</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200084</URL>
        <Description>SUSE Bug 1200084</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.</Note>
    </Notes>
    <CVE>CVE-2021-27364</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>3.6</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:P/I:N/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>7.1</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-27364.html</URL>
        <Description>CVE-2021-27364</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182715</URL>
        <Description>SUSE Bug 1182715</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182716</URL>
        <Description>SUSE Bug 1182716</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182717</URL>
        <Description>SUSE Bug 1182717</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200084</URL>
        <Description>SUSE Bug 1200084</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214268</URL>
        <Description>SUSE Bug 1214268</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218966</URL>
        <Description>SUSE Bug 1218966</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.</Note>
    </Notes>
    <CVE>CVE-2021-27365</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>4.6</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:P/I:P/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>7</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-27365.html</URL>
        <Description>CVE-2021-27365</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182712</URL>
        <Description>SUSE Bug 1182712</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182715</URL>
        <Description>SUSE Bug 1182715</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183491</URL>
        <Description>SUSE Bug 1183491</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200084</URL>
        <Description>SUSE Bug 1200084</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214268</URL>
        <Description>SUSE Bug 1214268</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218966</URL>
        <Description>SUSE Bug 1218966</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931.</Note>
    </Notes>
    <CVE>CVE-2021-28038</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>4.9</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:N/I:N/A:C</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>6.5</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-28038.html</URL>
        <Description>CVE-2021-28038</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183022</URL>
        <Description>SUSE Bug 1183022</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183069</URL>
        <Description>SUSE Bug 1183069</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the -&gt;ssid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base.</Note>
    </Notes>
    <CVE>CVE-2021-28660</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>8.3</BaseScoreV2>
        <VectorV2>AV:A/AC:L/Au:N/C:C/I:C/A:C</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>8</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-28660.html</URL>
        <Description>CVE-2021-28660</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183593</URL>
        <Description>SUSE Bug 1183593</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183658</URL>
        <Description>SUSE Bug 1183658</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11.</Note>
    </Notes>
    <CVE>CVE-2021-28688</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>2.1</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:N/I:N/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>6.5</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-28688.html</URL>
        <Description>CVE-2021-28688</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183646</URL>
        <Description>SUSE Bug 1183646</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in fs/fuse/fuse_i.h in the Linux kernel before 5.11.8. A "stall on CPU" can occur because a retry loop continually finds the same bad inode, aka CID-775c5033a0d1.</Note>
    </Notes>
    <CVE>CVE-2021-28950</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>2.1</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:N/I:N/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>6.2</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-28950.html</URL>
        <Description>CVE-2021-28950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184194</URL>
        <Description>SUSE Bug 1184194</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184211</URL>
        <Description>SUSE Bug 1184211</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A race condition was discovered in get_old_root in fs/btrfs/ctree.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (BUG) because of a lack of locking on an extent buffer before a cloning operation, aka CID-dbcc7d57bffc.</Note>
    </Notes>
    <CVE>CVE-2021-28964</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>1.9</BaseScoreV2>
        <VectorV2>AV:L/AC:M/Au:N/C:N/I:N/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>6.2</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-28964.html</URL>
        <Description>CVE-2021-28964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184193</URL>
        <Description>SUSE Bug 1184193</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.</Note>
    </Notes>
    <CVE>CVE-2021-28971</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>4.9</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:N/I:N/A:C</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>5.1</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-28971.html</URL>
        <Description>CVE-2021-28971</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184196</URL>
        <Description>SUSE Bug 1184196</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In drivers/pci/hotplug/rpadlpar_sysfs.c in the Linux kernel through 5.11.8, the RPA PCI Hotplug driver has a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\0' termination, aka CID-cc7a0bb058b8.</Note>
    </Notes>
    <CVE>CVE-2021-28972</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>7.2</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:C/I:C/A:C</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>6.4</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-28972.html</URL>
        <Description>CVE-2021-28972</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184198</URL>
        <Description>SUSE Bug 1184198</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220060</URL>
        <Description>SUSE Bug 1220060</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.</Note>
    </Notes>
    <CVE>CVE-2021-29154</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>7.2</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:C/I:C/A:C</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>7</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29154.html</URL>
        <Description>CVE-2021-29154</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184391</URL>
        <Description>SUSE Bug 1184391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184710</URL>
        <Description>SUSE Bug 1184710</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1186408</URL>
        <Description>SUSE Bug 1186408</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations.</Note>
    </Notes>
    <CVE>CVE-2021-29155</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>2.1</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:P/I:N/A:N</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>6.2</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29155.html</URL>
        <Description>CVE-2021-29155</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184942</URL>
        <Description>SUSE Bug 1184942</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel through 5.11.10. drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver allows attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled, aka CID-d8861bab48b6.</Note>
    </Notes>
    <CVE>CVE-2021-29264</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>4.7</BaseScoreV2>
        <VectorV2>AV:L/AC:M/Au:N/C:N/I:N/A:C</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>6.5</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29264.html</URL>
        <Description>CVE-2021-29264</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184168</URL>
        <Description>SUSE Bug 1184168</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel before 5.11.7. usbip_sockfd_store in drivers/usb/usbip/stub_dev.c allows attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status, aka CID-9380afd6df70.</Note>
    </Notes>
    <CVE>CVE-2021-29265</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>4.7</BaseScoreV2>
        <VectorV2>AV:L/AC:M/Au:N/C:N/I:N/A:C</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>5.5</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29265.html</URL>
        <Description>CVE-2021-29265</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184167</URL>
        <Description>SUSE Bug 1184167</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.</Note>
    </Notes>
    <CVE>CVE-2021-29647</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>2.1</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:P/I:N/A:N</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>5.5</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29647.html</URL>
        <Description>CVE-2021-29647</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184192</URL>
        <Description>SUSE Bug 1184192</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, aka CID-175e476b8cdf.</Note>
    </Notes>
    <CVE>CVE-2021-29650</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>4.9</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:N/I:N/A:C</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>5.5</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29650.html</URL>
        <Description>CVE-2021-29650</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184208</URL>
        <Description>SUSE Bug 1184208</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel before 5.11.3 when a webcam device exists. video_usercopy in drivers/media/v4l2-core/v4l2-ioctl.c has a memory leak for large arguments, aka CID-fb18802a338b.</Note>
    </Notes>
    <CVE>CVE-2021-30002</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>2.1</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:N/I:N/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>6.2</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30002.html</URL>
        <Description>CVE-2021-30002</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184120</URL>
        <Description>SUSE Bug 1184120</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a system crash problem which can lead to an availability threat.</Note>
    </Notes>
    <CVE>CVE-2021-3428</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>4.9</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:N/I:N/A:C</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>3.3</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3428.html</URL>
        <Description>CVE-2021-3428</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173485</URL>
        <Description>SUSE Bug 1173485</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183509</URL>
        <Description>SUSE Bug 1183509</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 ("bpf: Fix truncation handling for mod32 dst reg wrt zero") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.</Note>
    </Notes>
    <CVE>CVE-2021-3444</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>4.6</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:P/I:P/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>7</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3444.html</URL>
        <Description>CVE-2021-3444</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184170</URL>
        <Description>SUSE Bug 1184170</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184171</URL>
        <Description>SUSE Bug 1184171</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected</Note>
    </Notes>
    <CVE>CVE-2021-3483</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.72.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.72.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.72.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>4.6</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:P/I:P/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>6.5</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211573-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3483.html</URL>
        <Description>CVE-2021-3483</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184393</URL>
        <Description>SUSE Bug 1184393</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
</cvrfdoc>
