<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2021:14630-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-02-16T15:31:37Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-02-16T15:31:37Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-02-16T15:31:37Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:


- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-14353: Fixed an issue where keys - for keyctl prevent creating a different user's keyrings (bsc#1174993).
- CVE-2020-14381: Fixed requeue paths such that filp was valid when dropping the references (bsc#1176011).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-25285: A race condition between hugetlb sysctl handlers in mm/hugetlb.c could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact (bnc#1176485 ).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service (bsc#1179140).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).

The following non-security bugs were fixed:

- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- cifs: bugfix for unreclaimed writeback pages in cifs_writev_requeue() (bsc#1177906).
- mm, vmstat: reduce zone-&gt;lock holding time by /proc/pagetypeinfo (bsc#1175691).
- net/x25: fix a race in x25_bind() (bsc#1178590).
- net/x25: prevent a couple of overflows (bsc#1178590).
- tty: fix memleak in alloc_pid (bsc#1179745).
- xfs: mark all internal workqueues as freezable (bsc#1181166).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">slessp4-kernel-source-14630,slexsp3-kernel-source-14630</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      <Description>Link for SUSE-SU-2021:14630-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html</URL>
      <Description>E-Mail link for SUSE-SU-2021:14630-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1152107</URL>
      <Description>SUSE Bug 1152107</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1168952</URL>
      <Description>SUSE Bug 1168952</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173659</URL>
      <Description>SUSE Bug 1173659</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173942</URL>
      <Description>SUSE Bug 1173942</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174205</URL>
      <Description>SUSE Bug 1174205</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174247</URL>
      <Description>SUSE Bug 1174247</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174993</URL>
      <Description>SUSE Bug 1174993</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175691</URL>
      <Description>SUSE Bug 1175691</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176011</URL>
      <Description>SUSE Bug 1176011</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176012</URL>
      <Description>SUSE Bug 1176012</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176235</URL>
      <Description>SUSE Bug 1176235</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176253</URL>
      <Description>SUSE Bug 1176253</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176278</URL>
      <Description>SUSE Bug 1176278</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176395</URL>
      <Description>SUSE Bug 1176395</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176423</URL>
      <Description>SUSE Bug 1176423</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176482</URL>
      <Description>SUSE Bug 1176482</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176485</URL>
      <Description>SUSE Bug 1176485</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176722</URL>
      <Description>SUSE Bug 1176722</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176896</URL>
      <Description>SUSE Bug 1176896</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177206</URL>
      <Description>SUSE Bug 1177206</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177226</URL>
      <Description>SUSE Bug 1177226</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177666</URL>
      <Description>SUSE Bug 1177666</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177766</URL>
      <Description>SUSE Bug 1177766</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177906</URL>
      <Description>SUSE Bug 1177906</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178123</URL>
      <Description>SUSE Bug 1178123</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178182</URL>
      <Description>SUSE Bug 1178182</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178589</URL>
      <Description>SUSE Bug 1178589</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178590</URL>
      <Description>SUSE Bug 1178590</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178622</URL>
      <Description>SUSE Bug 1178622</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178886</URL>
      <Description>SUSE Bug 1178886</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179107</URL>
      <Description>SUSE Bug 1179107</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179140</URL>
      <Description>SUSE Bug 1179140</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179141</URL>
      <Description>SUSE Bug 1179141</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179419</URL>
      <Description>SUSE Bug 1179419</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179601</URL>
      <Description>SUSE Bug 1179601</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179616</URL>
      <Description>SUSE Bug 1179616</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179745</URL>
      <Description>SUSE Bug 1179745</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179877</URL>
      <Description>SUSE Bug 1179877</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180029</URL>
      <Description>SUSE Bug 1180029</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180030</URL>
      <Description>SUSE Bug 1180030</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180052</URL>
      <Description>SUSE Bug 1180052</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180086</URL>
      <Description>SUSE Bug 1180086</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180559</URL>
      <Description>SUSE Bug 1180559</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180562</URL>
      <Description>SUSE Bug 1180562</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1181158</URL>
      <Description>SUSE Bug 1181158</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1181166</URL>
      <Description>SUSE Bug 1181166</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1181349</URL>
      <Description>SUSE Bug 1181349</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1181553</URL>
      <Description>SUSE Bug 1181553</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-16746/</URL>
      <Description>SUSE CVE CVE-2019-16746 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-0404/</URL>
      <Description>SUSE CVE CVE-2020-0404 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-0431/</URL>
      <Description>SUSE CVE CVE-2020-0431 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-0465/</URL>
      <Description>SUSE CVE CVE-2020-0465 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-11668/</URL>
      <Description>SUSE CVE CVE-2020-11668 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14331/</URL>
      <Description>SUSE CVE CVE-2020-14331 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14353/</URL>
      <Description>SUSE CVE CVE-2020-14353 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14381/</URL>
      <Description>SUSE CVE CVE-2020-14381 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14390/</URL>
      <Description>SUSE CVE CVE-2020-14390 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15436/</URL>
      <Description>SUSE CVE CVE-2020-15436 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15437/</URL>
      <Description>SUSE CVE CVE-2020-15437 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25211/</URL>
      <Description>SUSE CVE CVE-2020-25211 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25284/</URL>
      <Description>SUSE CVE CVE-2020-25284 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25285/</URL>
      <Description>SUSE CVE CVE-2020-25285 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25643/</URL>
      <Description>SUSE CVE CVE-2020-25643 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25656/</URL>
      <Description>SUSE CVE CVE-2020-25656 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25668/</URL>
      <Description>SUSE CVE CVE-2020-25668 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25669/</URL>
      <Description>SUSE CVE CVE-2020-25669 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27068/</URL>
      <Description>SUSE CVE CVE-2020-27068 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27777/</URL>
      <Description>SUSE CVE CVE-2020-27777 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27786/</URL>
      <Description>SUSE CVE CVE-2020-27786 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-28915/</URL>
      <Description>SUSE CVE CVE-2020-28915 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-28974/</URL>
      <Description>SUSE CVE CVE-2020-28974 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29660/</URL>
      <Description>SUSE CVE CVE-2020-29660 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29661/</URL>
      <Description>SUSE CVE CVE-2020-29661 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-36158/</URL>
      <Description>SUSE CVE CVE-2020-36158 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-4788/</URL>
      <Description>SUSE CVE CVE-2020-4788 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3347/</URL>
      <Description>SUSE CVE CVE-2021-3347 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP4-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS" CPE="cpe:/o:suse:suse_sles:11:sp4">SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-bigmem-3.0.101-108.120.1">
      <FullProductName ProductID="kernel-bigmem-3.0.101-108.120.1">kernel-bigmem-3.0.101-108.120.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-bigmem-base-3.0.101-108.120.1">
      <FullProductName ProductID="kernel-bigmem-base-3.0.101-108.120.1">kernel-bigmem-base-3.0.101-108.120.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-bigmem-devel-3.0.101-108.120.1">
      <FullProductName ProductID="kernel-bigmem-devel-3.0.101-108.120.1">kernel-bigmem-devel-3.0.101-108.120.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-3.0.101-108.120.1">
      <FullProductName ProductID="kernel-default-3.0.101-108.120.1">kernel-default-3.0.101-108.120.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-3.0.101-108.120.1">
      <FullProductName ProductID="kernel-default-base-3.0.101-108.120.1">kernel-default-base-3.0.101-108.120.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-3.0.101-108.120.1">
      <FullProductName ProductID="kernel-default-devel-3.0.101-108.120.1">kernel-default-devel-3.0.101-108.120.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-man-3.0.101-108.120.1">
      <FullProductName ProductID="kernel-default-man-3.0.101-108.120.1">kernel-default-man-3.0.101-108.120.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-3.0.101-108.120.1">
      <FullProductName ProductID="kernel-ec2-3.0.101-108.120.1">kernel-ec2-3.0.101-108.120.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-base-3.0.101-108.120.1">
      <FullProductName ProductID="kernel-ec2-base-3.0.101-108.120.1">kernel-ec2-base-3.0.101-108.120.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-devel-3.0.101-108.120.1">
      <FullProductName ProductID="kernel-ec2-devel-3.0.101-108.120.1">kernel-ec2-devel-3.0.101-108.120.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-3.0.101-108.120.1">
      <FullProductName ProductID="kernel-pae-3.0.101-108.120.1">kernel-pae-3.0.101-108.120.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-base-3.0.101-108.120.1">
      <FullProductName ProductID="kernel-pae-base-3.0.101-108.120.1">kernel-pae-base-3.0.101-108.120.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-devel-3.0.101-108.120.1">
      <FullProductName ProductID="kernel-pae-devel-3.0.101-108.120.1">kernel-pae-devel-3.0.101-108.120.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ppc64-3.0.101-108.120.1">
      <FullProductName ProductID="kernel-ppc64-3.0.101-108.120.1">kernel-ppc64-3.0.101-108.120.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ppc64-base-3.0.101-108.120.1">
      <FullProductName ProductID="kernel-ppc64-base-3.0.101-108.120.1">kernel-ppc64-base-3.0.101-108.120.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ppc64-devel-3.0.101-108.120.1">
      <FullProductName ProductID="kernel-ppc64-devel-3.0.101-108.120.1">kernel-ppc64-devel-3.0.101-108.120.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-3.0.101-108.120.1">
      <FullProductName ProductID="kernel-source-3.0.101-108.120.1">kernel-source-3.0.101-108.120.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-3.0.101-108.120.1">
      <FullProductName ProductID="kernel-syms-3.0.101-108.120.1">kernel-syms-3.0.101-108.120.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-3.0.101-108.120.1">
      <FullProductName ProductID="kernel-trace-3.0.101-108.120.1">kernel-trace-3.0.101-108.120.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-base-3.0.101-108.120.1">
      <FullProductName ProductID="kernel-trace-base-3.0.101-108.120.1">kernel-trace-base-3.0.101-108.120.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-devel-3.0.101-108.120.1">
      <FullProductName ProductID="kernel-trace-devel-3.0.101-108.120.1">kernel-trace-devel-3.0.101-108.120.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-3.0.101-108.120.1">
      <FullProductName ProductID="kernel-xen-3.0.101-108.120.1">kernel-xen-3.0.101-108.120.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-base-3.0.101-108.120.1">
      <FullProductName ProductID="kernel-xen-base-3.0.101-108.120.1">kernel-xen-base-3.0.101-108.120.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-devel-3.0.101-108.120.1">
      <FullProductName ProductID="kernel-xen-devel-3.0.101-108.120.1">kernel-xen-devel-3.0.101-108.120.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-bigmem-3.0.101-108.120.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1">kernel-bigmem-3.0.101-108.120.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-bigmem-base-3.0.101-108.120.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1">kernel-bigmem-base-3.0.101-108.120.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-bigmem-devel-3.0.101-108.120.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1">kernel-bigmem-devel-3.0.101-108.120.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-3.0.101-108.120.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1">kernel-default-3.0.101-108.120.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-3.0.101-108.120.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1">kernel-default-base-3.0.101-108.120.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-3.0.101-108.120.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1">kernel-default-devel-3.0.101-108.120.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-man-3.0.101-108.120.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1">kernel-default-man-3.0.101-108.120.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-3.0.101-108.120.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1">kernel-ec2-3.0.101-108.120.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-base-3.0.101-108.120.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1">kernel-ec2-base-3.0.101-108.120.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-devel-3.0.101-108.120.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1">kernel-ec2-devel-3.0.101-108.120.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-3.0.101-108.120.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1">kernel-pae-3.0.101-108.120.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-base-3.0.101-108.120.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1">kernel-pae-base-3.0.101-108.120.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-devel-3.0.101-108.120.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1">kernel-pae-devel-3.0.101-108.120.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ppc64-3.0.101-108.120.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1">kernel-ppc64-3.0.101-108.120.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ppc64-base-3.0.101-108.120.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1">kernel-ppc64-base-3.0.101-108.120.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ppc64-devel-3.0.101-108.120.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1">kernel-ppc64-devel-3.0.101-108.120.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-3.0.101-108.120.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1">kernel-source-3.0.101-108.120.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-3.0.101-108.120.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1">kernel-syms-3.0.101-108.120.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-trace-3.0.101-108.120.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1">kernel-trace-3.0.101-108.120.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-trace-base-3.0.101-108.120.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1">kernel-trace-base-3.0.101-108.120.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-trace-devel-3.0.101-108.120.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1">kernel-trace-devel-3.0.101-108.120.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-3.0.101-108.120.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1">kernel-xen-3.0.101-108.120.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-base-3.0.101-108.120.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1">kernel-xen-base-3.0.101-108.120.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-devel-3.0.101-108.120.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1">kernel-xen-devel-3.0.101-108.120.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2019-16746</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-16746.html</URL>
        <Description>CVE-2019-16746</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1152107</URL>
        <Description>SUSE Bug 1152107</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173659</URL>
        <Description>SUSE Bug 1173659</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel</Note>
    </Notes>
    <CVE>CVE-2020-0404</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-0404.html</URL>
        <Description>CVE-2020-0404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176423</URL>
        <Description>SUSE Bug 1176423</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459</Note>
    </Notes>
    <CVE>CVE-2020-0431</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-0431.html</URL>
        <Description>CVE-2020-0431</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176722</URL>
        <Description>SUSE Bug 1176722</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176896</URL>
        <Description>SUSE Bug 1176896</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel</Note>
    </Notes>
    <CVE>CVE-2020-0465</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-0465.html</URL>
        <Description>CVE-2020-0465</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180029</URL>
        <Description>SUSE Bug 1180029</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180030</URL>
        <Description>SUSE Bug 1180030</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.</Note>
    </Notes>
    <CVE>CVE-2020-11668</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-11668.html</URL>
        <Description>CVE-2020-11668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1168952</URL>
        <Description>SUSE Bug 1168952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173942</URL>
        <Description>SUSE Bug 1173942</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel's implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2020-14331</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14331.html</URL>
        <Description>CVE-2020-14331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174205</URL>
        <Description>SUSE Bug 1174205</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174247</URL>
        <Description>SUSE Bug 1174247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-18270. Reason: This candidate is a duplicate of CVE-2017-18270. Notes: All CVE users should reference CVE-2017-18270 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage</Note>
    </Notes>
    <CVE>CVE-2020-14353</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14353.html</URL>
        <Description>CVE-2020-14353</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174993</URL>
        <Description>SUSE Bug 1174993</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel's futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2020-14381</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14381.html</URL>
        <Description>CVE-2020-14381</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176011</URL>
        <Description>SUSE Bug 1176011</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176012</URL>
        <Description>SUSE Bug 1176012</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.</Note>
    </Notes>
    <CVE>CVE-2020-14390</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14390.html</URL>
        <Description>CVE-2020-14390</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176235</URL>
        <Description>SUSE Bug 1176235</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176253</URL>
        <Description>SUSE Bug 1176253</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176278</URL>
        <Description>SUSE Bug 1176278</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.</Note>
    </Notes>
    <CVE>CVE-2020-15436</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15436.html</URL>
        <Description>CVE-2020-15436</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179141</URL>
        <Description>SUSE Bug 1179141</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p-&gt;serial_in pointer which uninitialized.</Note>
    </Notes>
    <CVE>CVE-2020-15437</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15437.html</URL>
        <Description>CVE-2020-15437</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179140</URL>
        <Description>SUSE Bug 1179140</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.</Note>
    </Notes>
    <CVE>CVE-2020-25211</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25211.html</URL>
        <Description>CVE-2020-25211</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176395</URL>
        <Description>SUSE Bug 1176395</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192356</URL>
        <Description>SUSE Bug 1192356</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.</Note>
    </Notes>
    <CVE>CVE-2020-25284</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25284.html</URL>
        <Description>CVE-2020-25284</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176482</URL>
        <Description>SUSE Bug 1176482</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.</Note>
    </Notes>
    <CVE>CVE-2020-25285</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25285.html</URL>
        <Description>CVE-2020-25285</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176485</URL>
        <Description>SUSE Bug 1176485</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2020-25643</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25643.html</URL>
        <Description>CVE-2020-25643</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177206</URL>
        <Description>SUSE Bug 1177206</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177226</URL>
        <Description>SUSE Bug 1177226</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.</Note>
    </Notes>
    <CVE>CVE-2020-25656</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25656.html</URL>
        <Description>CVE-2020-25656</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177766</URL>
        <Description>SUSE Bug 1177766</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.</Note>
    </Notes>
    <CVE>CVE-2020-25668</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25668.html</URL>
        <Description>CVE-2020-25668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178123</URL>
        <Description>SUSE Bug 1178123</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178622</URL>
        <Description>SUSE Bug 1178622</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196914</URL>
        <Description>SUSE Bug 1196914</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.</Note>
    </Notes>
    <CVE>CVE-2020-25669</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25669.html</URL>
        <Description>CVE-2020-25669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178182</URL>
        <Description>SUSE Bug 1178182</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel</Note>
    </Notes>
    <CVE>CVE-2020-27068</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27068.html</URL>
        <Description>CVE-2020-27068</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180086</URL>
        <Description>SUSE Bug 1180086</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.</Note>
    </Notes>
    <CVE>CVE-2020-27777</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27777.html</URL>
        <Description>CVE-2020-27777</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179107</URL>
        <Description>SUSE Bug 1179107</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179419</URL>
        <Description>SUSE Bug 1179419</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200343</URL>
        <Description>SUSE Bug 1200343</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220060</URL>
        <Description>SUSE Bug 1220060</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel's implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2020-27786</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27786.html</URL>
        <Description>CVE-2020-27786</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179601</URL>
        <Description>SUSE Bug 1179601</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179616</URL>
        <Description>SUSE Bug 1179616</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.</Note>
    </Notes>
    <CVE>CVE-2020-28915</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-28915.html</URL>
        <Description>CVE-2020-28915</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178886</URL>
        <Description>SUSE Bug 1178886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.</Note>
    </Notes>
    <CVE>CVE-2020-28974</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-28974.html</URL>
        <Description>CVE-2020-28974</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178589</URL>
        <Description>SUSE Bug 1178589</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.</Note>
    </Notes>
    <CVE>CVE-2020-29660</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29660.html</URL>
        <Description>CVE-2020-29660</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179745</URL>
        <Description>SUSE Bug 1179745</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179877</URL>
        <Description>SUSE Bug 1179877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.</Note>
    </Notes>
    <CVE>CVE-2020-29661</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29661.html</URL>
        <Description>CVE-2020-29661</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179745</URL>
        <Description>SUSE Bug 1179745</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179877</URL>
        <Description>SUSE Bug 1179877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214268</URL>
        <Description>SUSE Bug 1214268</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218966</URL>
        <Description>SUSE Bug 1218966</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.</Note>
    </Notes>
    <CVE>CVE-2020-36158</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-36158.html</URL>
        <Description>CVE-2020-36158</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180559</URL>
        <Description>SUSE Bug 1180559</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180562</URL>
        <Description>SUSE Bug 1180562</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.</Note>
    </Notes>
    <CVE>CVE-2020-4788</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-4788.html</URL>
        <Description>CVE-2020-4788</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177666</URL>
        <Description>SUSE Bug 1177666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181158</URL>
        <Description>SUSE Bug 1181158</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.</Note>
    </Notes>
    <CVE>CVE-2021-3347</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3347.html</URL>
        <Description>CVE-2021-3347</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181349</URL>
        <Description>SUSE Bug 1181349</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181553</URL>
        <Description>SUSE Bug 1181553</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1190859</URL>
        <Description>SUSE Bug 1190859</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
