<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2023:2151-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-05-09T15:35:27Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-05-09T15:35:27Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-05-09T15:35:27Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-2124: Fixed an out of bound access in the XFS subsystem that could have lead to denial-of-service or potentially privilege escalation (bsc#1210498).
- CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).
- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).
- CVE-2023-1998: Fixed a use after free during login when accessing the shost ipaddress (bsc#1210506).
- CVE-2023-30772: Fixed a race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329).
- CVE-2023-1855: Fixed a use after free in xgene_hwmon_remove (bsc#1210202).
- CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).
- CVE-2023-1990: Fixed a use after free in ndlc_remove (bsc#1210337).
- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).
- CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).
- CVE-2020-36691: Fixed a denial of service vulnerability via a nested Netlink policy with a back reference (bsc#1209777).

The following non-security bugs were fixed:

- cifs: fix negotiate context parsing (bsc#1210301).
- cred: allow get_cred() and put_cred() to be given NULL (bsc#1209887).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2023-2151,SUSE-SLE-Module-Live-Patching-15-SP1-2023-2151,SUSE-SLE-Product-HA-15-SP1-2023-2151,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2151,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2151,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2151,openSUSE-SLE-15.4-2023-2151</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232151-1/</URL>
      <Description>Link for SUSE-SU-2023:2151-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2023-May/029294.html</URL>
      <Description>E-Mail link for SUSE-SU-2023:2151-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1202353</URL>
      <Description>SUSE Bug 1202353</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1205128</URL>
      <Description>SUSE Bug 1205128</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1209613</URL>
      <Description>SUSE Bug 1209613</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1209687</URL>
      <Description>SUSE Bug 1209687</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1209777</URL>
      <Description>SUSE Bug 1209777</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1209871</URL>
      <Description>SUSE Bug 1209871</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1209887</URL>
      <Description>SUSE Bug 1209887</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1210202</URL>
      <Description>SUSE Bug 1210202</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1210301</URL>
      <Description>SUSE Bug 1210301</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1210329</URL>
      <Description>SUSE Bug 1210329</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1210336</URL>
      <Description>SUSE Bug 1210336</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1210337</URL>
      <Description>SUSE Bug 1210337</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1210469</URL>
      <Description>SUSE Bug 1210469</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1210498</URL>
      <Description>SUSE Bug 1210498</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1210506</URL>
      <Description>SUSE Bug 1210506</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1210647</URL>
      <Description>SUSE Bug 1210647</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-36691/</URL>
      <Description>SUSE CVE CVE-2020-36691 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-43945/</URL>
      <Description>SUSE CVE CVE-2022-43945 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-1611/</URL>
      <Description>SUSE CVE CVE-2023-1611 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-1670/</URL>
      <Description>SUSE CVE CVE-2023-1670 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-1855/</URL>
      <Description>SUSE CVE CVE-2023-1855 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-1989/</URL>
      <Description>SUSE CVE CVE-2023-1989 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-1990/</URL>
      <Description>SUSE CVE CVE-2023-1990 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-1998/</URL>
      <Description>SUSE CVE CVE-2023-1998 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-2124/</URL>
      <Description>SUSE CVE CVE-2023-2124 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-2162/</URL>
      <Description>SUSE CVE CVE-2023-2162 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-30772/</URL>
      <Description>SUSE CVE CVE-2023-30772 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Availability Extension 15 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Availability Extension 15 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15 SP1" CPE="cpe:/o:suse:sle-ha:15:sp1">SUSE Linux Enterprise High Availability Extension 15 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" CPE="cpe:/o:suse:sle_hpc-ltss:15:sp1">SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 15 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 15 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP1" CPE="cpe:/o:suse:sle-module-live-patching:15:sp1">SUSE Linux Enterprise Live Patching 15 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP1-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15 SP1-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP1-LTSS" CPE="cpe:/o:suse:sles-ltss:15:sp1">SUSE Linux Enterprise Server 15 SP1-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP1" CPE="cpe:/o:suse:sles_sap:15:sp1">SUSE Linux Enterprise Server for SAP Applications 15 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.4">
      <Branch Type="Product Name" Name="openSUSE Leap 15.4">
        <FullProductName ProductID="openSUSE Leap 15.4" CPE="cpe:/o:opensuse:leap:15.4">openSUSE Leap 15.4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="cluster-md-kmp-default-4.12.14-150100.197.145.1">
      <FullProductName ProductID="cluster-md-kmp-default-4.12.14-150100.197.145.1">cluster-md-kmp-default-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dlm-kmp-default-4.12.14-150100.197.145.1">
      <FullProductName ProductID="dlm-kmp-default-4.12.14-150100.197.145.1">dlm-kmp-default-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gfs2-kmp-default-4.12.14-150100.197.145.1">
      <FullProductName ProductID="gfs2-kmp-default-4.12.14-150100.197.145.1">gfs2-kmp-default-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-debug-4.12.14-150100.197.145.1">kernel-debug-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-base-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-debug-base-4.12.14-150100.197.145.1">kernel-debug-base-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-devel-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-debug-devel-4.12.14-150100.197.145.1">kernel-debug-devel-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-livepatch-devel-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-debug-livepatch-devel-4.12.14-150100.197.145.1">kernel-debug-livepatch-devel-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-default-4.12.14-150100.197.145.1">kernel-default-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-default-base-4.12.14-150100.197.145.1">kernel-default-base-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-default-devel-4.12.14-150100.197.145.1">kernel-default-devel-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-extra-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-default-extra-4.12.14-150100.197.145.1">kernel-default-extra-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-livepatch-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-default-livepatch-4.12.14-150100.197.145.1">kernel-default-livepatch-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-livepatch-devel-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-default-livepatch-devel-4.12.14-150100.197.145.1">kernel-default-livepatch-devel-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-man-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-default-man-4.12.14-150100.197.145.1">kernel-default-man-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-devel-4.12.14-150100.197.145.1">kernel-devel-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-docs-4.12.14-150100.197.145.1">kernel-docs-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-html-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-docs-html-4.12.14-150100.197.145.1">kernel-docs-html-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-kvmsmall-4.12.14-150100.197.145.1">kernel-kvmsmall-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-base-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-kvmsmall-base-4.12.14-150100.197.145.1">kernel-kvmsmall-base-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-devel-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-kvmsmall-devel-4.12.14-150100.197.145.1">kernel-kvmsmall-devel-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-livepatch-devel-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-kvmsmall-livepatch-devel-4.12.14-150100.197.145.1">kernel-kvmsmall-livepatch-devel-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1">
      <FullProductName ProductID="kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1">kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-macros-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-macros-4.12.14-150100.197.145.1">kernel-macros-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-build-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-obs-build-4.12.14-150100.197.145.1">kernel-obs-build-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-qa-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-obs-qa-4.12.14-150100.197.145.1">kernel-obs-qa-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-source-4.12.14-150100.197.145.1">kernel-source-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-vanilla-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-source-vanilla-4.12.14-150100.197.145.1">kernel-source-vanilla-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-syms-4.12.14-150100.197.145.1">kernel-syms-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-vanilla-4.12.14-150100.197.145.1">kernel-vanilla-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-base-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-vanilla-base-4.12.14-150100.197.145.1">kernel-vanilla-base-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-devel-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-vanilla-devel-4.12.14-150100.197.145.1">kernel-vanilla-devel-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1">kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-zfcpdump-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-zfcpdump-4.12.14-150100.197.145.1">kernel-zfcpdump-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-zfcpdump-man-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kernel-zfcpdump-man-4.12.14-150100.197.145.1">kernel-zfcpdump-man-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kselftests-kmp-default-4.12.14-150100.197.145.1">
      <FullProductName ProductID="kselftests-kmp-default-4.12.14-150100.197.145.1">kselftests-kmp-default-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ocfs2-kmp-default-4.12.14-150100.197.145.1">
      <FullProductName ProductID="ocfs2-kmp-default-4.12.14-150100.197.145.1">ocfs2-kmp-default-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="reiserfs-kmp-default-4.12.14-150100.197.145.1">
      <FullProductName ProductID="reiserfs-kmp-default-4.12.14-150100.197.145.1">reiserfs-kmp-default-4.12.14-150100.197.145.1</FullProductName>
    </Branch>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Availability Extension 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1">cluster-md-kmp-default-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise High Availability Extension 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Availability Extension 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1">dlm-kmp-default-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise High Availability Extension 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Availability Extension 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1">gfs2-kmp-default-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise High Availability Extension 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Availability Extension 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1">ocfs2-kmp-default-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise High Availability Extension 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1">kernel-default-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1">kernel-default-base-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1">kernel-default-devel-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1">kernel-devel-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1">kernel-docs-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1">kernel-macros-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-build-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1">kernel-obs-build-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1">kernel-source-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1">kernel-syms-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-livepatch-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1">kernel-default-livepatch-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise Live Patching 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-livepatch-devel-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1">kernel-default-livepatch-devel-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise Live Patching 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1">kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1 as a component of SUSE Linux Enterprise Live Patching 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1">kernel-default-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise Server 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1">kernel-default-base-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise Server 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1">kernel-default-devel-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise Server 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-man-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1">kernel-default-man-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise Server 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1">kernel-devel-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise Server 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1">kernel-docs-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise Server 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1">kernel-macros-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise Server 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-build-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1">kernel-obs-build-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise Server 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1">kernel-source-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise Server 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1">kernel-syms-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise Server 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="reiserfs-kmp-default-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1">reiserfs-kmp-default-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise Server 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1">kernel-default-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1">kernel-default-base-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1">kernel-default-devel-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1">kernel-devel-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1">kernel-docs-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1">kernel-macros-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-build-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1">kernel-obs-build-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1">kernel-source-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1">kernel-syms-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="reiserfs-kmp-default-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1">reiserfs-kmp-default-4.12.14-150100.197.145.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-debug-base-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1">kernel-debug-base-4.12.14-150100.197.145.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-man-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1">kernel-default-man-4.12.14-150100.197.145.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-kvmsmall-base-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1">kernel-kvmsmall-base-4.12.14-150100.197.145.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-vanilla-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1">kernel-vanilla-4.12.14-150100.197.145.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-vanilla-base-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1">kernel-vanilla-base-4.12.14-150100.197.145.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-vanilla-devel-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1">kernel-vanilla-devel-4.12.14-150100.197.145.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1">kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-zfcpdump-man-4.12.14-150100.197.145.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1">kernel-zfcpdump-man-4.12.14-150100.197.145.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
  </ProductTree>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel before 5.8. lib/nlattr.c allows attackers to cause a denial of service (unbounded recursion) via a nested Netlink policy with a back reference.</Note>
    </Notes>
    <CVE>CVE-2020-36691</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>5.9</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232151-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-36691.html</URL>
        <Description>CVE-2020-36691</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1209613</URL>
        <Description>SUSE Bug 1209613</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1209777</URL>
        <Description>SUSE Bug 1209777</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Note>
    </Notes>
    <CVE>CVE-2022-43945</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>8.8</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232151-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-43945.html</URL>
        <Description>CVE-2022-43945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205128</URL>
        <Description>SUSE Bug 1205128</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205130</URL>
        <Description>SUSE Bug 1205130</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208030</URL>
        <Description>SUSE Bug 1208030</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208085</URL>
        <Description>SUSE Bug 1208085</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1209225</URL>
        <Description>SUSE Bug 1209225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1210124</URL>
        <Description>SUSE Bug 1210124</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea</Note>
    </Notes>
    <CVE>CVE-2023-1611</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>4.7</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232151-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-1611.html</URL>
        <Description>CVE-2023-1611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1209687</URL>
        <Description>SUSE Bug 1209687</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw use after free in the Linux kernel Xircom 16-bit PCMCIA (PC-card) Ethernet driver was found.A local user could use this flaw to crash the system or potentially escalate their privileges on the system.</Note>
    </Notes>
    <CVE>CVE-2023-1670</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>4.4</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232151-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-1670.html</URL>
        <Description>CVE-2023-1670</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1209871</URL>
        <Description>SUSE Bug 1209871</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222212</URL>
        <Description>SUSE Bug 1222212</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem.</Note>
    </Notes>
    <CVE>CVE-2023-1855</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>6.4</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232151-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-1855.html</URL>
        <Description>CVE-2023-1855</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1210202</URL>
        <Description>SUSE Bug 1210202</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free flaw was found in btsdio_remove in drivers\bluetooth\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.</Note>
    </Notes>
    <CVE>CVE-2023-1989</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>7.8</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232151-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-1989.html</URL>
        <Description>CVE-2023-1989</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1210336</URL>
        <Description>SUSE Bug 1210336</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1210500</URL>
        <Description>SUSE Bug 1210500</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213841</URL>
        <Description>SUSE Bug 1213841</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213842</URL>
        <Description>SUSE Bug 1213842</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214128</URL>
        <Description>SUSE Bug 1214128</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem.</Note>
    </Notes>
    <CVE>CVE-2023-1990</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>7</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232151-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-1990.html</URL>
        <Description>CVE-2023-1990</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1210337</URL>
        <Description>SUSE Bug 1210337</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1210501</URL>
        <Description>SUSE Bug 1210501</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214128</URL>
        <Description>SUSE Bug 1214128</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line.

This happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.</Note>
    </Notes>
    <CVE>CVE-2023-1998</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>5.6</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232151-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-1998.html</URL>
        <Description>CVE-2023-1998</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1210506</URL>
        <Description>SUSE Bug 1210506</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out-of-bounds memory access flaw was found in the Linux kernel's XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.</Note>
    </Notes>
    <CVE>CVE-2023-2124</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>6.7</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232151-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-2124.html</URL>
        <Description>CVE-2023-2124</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1210498</URL>
        <Description>SUSE Bug 1210498</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.</Note>
    </Notes>
    <CVE>CVE-2023-2162</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>7</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232151-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-2162.html</URL>
        <Description>CVE-2023-2162</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1210647</URL>
        <Description>SUSE Bug 1210647</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1210662</URL>
        <Description>SUSE Bug 1210662</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213841</URL>
        <Description>SUSE Bug 1213841</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213842</URL>
        <Description>SUSE Bug 1213842</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214128</URL>
        <Description>SUSE Bug 1214128</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222212</URL>
        <Description>SUSE Bug 1222212</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device.</Note>
    </Notes>
    <CVE>CVE-2023-30772</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_145-default-1-150100.3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.145.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.145.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.145.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>6.4</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232151-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-30772.html</URL>
        <Description>CVE-2023-30772</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1210329</URL>
        <Description>SUSE Bug 1210329</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
</cvrfdoc>
