<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">kernel-devel-5.14.6-1.4 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10728-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">kernel-devel-5.14.6-1.4 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the kernel-devel-5.14.6-1.4 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10728</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-1000251/</URL>
      <Description>SUSE CVE CVE-2017-1000251 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12153/</URL>
      <Description>SUSE CVE CVE-2017-12153 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13080/</URL>
      <Description>SUSE CVE CVE-2017-13080 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-14051/</URL>
      <Description>SUSE CVE CVE-2017-14051 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15129/</URL>
      <Description>SUSE CVE CVE-2017-15129 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15265/</URL>
      <Description>SUSE CVE CVE-2017-15265 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-16536/</URL>
      <Description>SUSE CVE CVE-2017-16536 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-16537/</URL>
      <Description>SUSE CVE CVE-2017-16537 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-16645/</URL>
      <Description>SUSE CVE CVE-2017-16645 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-16646/</URL>
      <Description>SUSE CVE CVE-2017-16646 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-16647/</URL>
      <Description>SUSE CVE CVE-2017-16647 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-16648/</URL>
      <Description>SUSE CVE CVE-2017-16648 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-16995/</URL>
      <Description>SUSE CVE CVE-2017-16995 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-16996/</URL>
      <Description>SUSE CVE CVE-2017-16996 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-17448/</URL>
      <Description>SUSE CVE CVE-2017-17448 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-17449/</URL>
      <Description>SUSE CVE CVE-2017-17449 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-17450/</URL>
      <Description>SUSE CVE CVE-2017-17450 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-17852/</URL>
      <Description>SUSE CVE CVE-2017-17852 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-17853/</URL>
      <Description>SUSE CVE CVE-2017-17853 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-17854/</URL>
      <Description>SUSE CVE CVE-2017-17854 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-17855/</URL>
      <Description>SUSE CVE CVE-2017-17855 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-17856/</URL>
      <Description>SUSE CVE CVE-2017-17856 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-17857/</URL>
      <Description>SUSE CVE CVE-2017-17857 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-17862/</URL>
      <Description>SUSE CVE CVE-2017-17862 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5123/</URL>
      <Description>SUSE CVE CVE-2017-5123 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5715/</URL>
      <Description>SUSE CVE CVE-2017-5715 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5753/</URL>
      <Description>SUSE CVE CVE-2017-5753 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5754/</URL>
      <Description>SUSE CVE CVE-2017-5754 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7541/</URL>
      <Description>SUSE CVE CVE-2017-7541 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7542/</URL>
      <Description>SUSE CVE CVE-2017-7542 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-8824/</URL>
      <Description>SUSE CVE CVE-2017-8824 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-8831/</URL>
      <Description>SUSE CVE CVE-2017-8831 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1000004/</URL>
      <Description>SUSE CVE CVE-2018-1000004 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10322/</URL>
      <Description>SUSE CVE CVE-2018-10322 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10323/</URL>
      <Description>SUSE CVE CVE-2018-10323 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1068/</URL>
      <Description>SUSE CVE CVE-2018-1068 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1118/</URL>
      <Description>SUSE CVE CVE-2018-1118 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12232/</URL>
      <Description>SUSE CVE CVE-2018-12232 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12714/</URL>
      <Description>SUSE CVE CVE-2018-12714 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-13053/</URL>
      <Description>SUSE CVE CVE-2018-13053 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18710/</URL>
      <Description>SUSE CVE CVE-2018-18710 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19824/</URL>
      <Description>SUSE CVE CVE-2018-19824 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5332/</URL>
      <Description>SUSE CVE CVE-2018-5332 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5333/</URL>
      <Description>SUSE CVE CVE-2018-5333 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-8043/</URL>
      <Description>SUSE CVE CVE-2018-8043 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-8087/</URL>
      <Description>SUSE CVE CVE-2018-8087 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-8822/</URL>
      <Description>SUSE CVE CVE-2018-8822 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10207/</URL>
      <Description>SUSE CVE CVE-2019-10207 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11477/</URL>
      <Description>SUSE CVE CVE-2019-11477 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11478/</URL>
      <Description>SUSE CVE CVE-2019-11478 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11479/</URL>
      <Description>SUSE CVE CVE-2019-11479 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-14615/</URL>
      <Description>SUSE CVE CVE-2019-14615 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-14814/</URL>
      <Description>SUSE CVE CVE-2019-14814 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-14896/</URL>
      <Description>SUSE CVE CVE-2019-14896 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-15030/</URL>
      <Description>SUSE CVE CVE-2019-15030 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-15031/</URL>
      <Description>SUSE CVE CVE-2019-15031 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-15098/</URL>
      <Description>SUSE CVE CVE-2019-15098 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-15099/</URL>
      <Description>SUSE CVE CVE-2019-15099 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-15290/</URL>
      <Description>SUSE CVE CVE-2019-15290 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-15504/</URL>
      <Description>SUSE CVE CVE-2019-15504 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-15902/</URL>
      <Description>SUSE CVE CVE-2019-15902 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-16231/</URL>
      <Description>SUSE CVE CVE-2019-16231 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-16232/</URL>
      <Description>SUSE CVE CVE-2019-16232 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-16234/</URL>
      <Description>SUSE CVE CVE-2019-16234 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-17133/</URL>
      <Description>SUSE CVE CVE-2019-17133 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-17666/</URL>
      <Description>SUSE CVE CVE-2019-17666 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-18808/</URL>
      <Description>SUSE CVE CVE-2019-18808 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-18812/</URL>
      <Description>SUSE CVE CVE-2019-18812 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-18813/</URL>
      <Description>SUSE CVE CVE-2019-18813 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19252/</URL>
      <Description>SUSE CVE CVE-2019-19252 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19332/</URL>
      <Description>SUSE CVE CVE-2019-19332 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19338/</URL>
      <Description>SUSE CVE CVE-2019-19338 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3016/</URL>
      <Description>SUSE CVE CVE-2019-3016 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3846/</URL>
      <Description>SUSE CVE CVE-2019-3846 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3882/</URL>
      <Description>SUSE CVE CVE-2019-3882 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3887/</URL>
      <Description>SUSE CVE CVE-2019-3887 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6974/</URL>
      <Description>SUSE CVE CVE-2019-6974 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-7221/</URL>
      <Description>SUSE CVE CVE-2019-7221 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-7222/</URL>
      <Description>SUSE CVE CVE-2019-7222 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8564/</URL>
      <Description>SUSE CVE CVE-2019-8564 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8912/</URL>
      <Description>SUSE CVE CVE-2019-8912 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9500/</URL>
      <Description>SUSE CVE CVE-2019-9500 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10135/</URL>
      <Description>SUSE CVE CVE-2020-10135 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10766/</URL>
      <Description>SUSE CVE CVE-2020-10766 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10767/</URL>
      <Description>SUSE CVE CVE-2020-10767 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10768/</URL>
      <Description>SUSE CVE CVE-2020-10768 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-12351/</URL>
      <Description>SUSE CVE CVE-2020-12351 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-12352/</URL>
      <Description>SUSE CVE CVE-2020-12352 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14331/</URL>
      <Description>SUSE CVE CVE-2020-14331 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14386/</URL>
      <Description>SUSE CVE CVE-2020-14386 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-24586/</URL>
      <Description>SUSE CVE CVE-2020-24586 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-24587/</URL>
      <Description>SUSE CVE CVE-2020-24587 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-24588/</URL>
      <Description>SUSE CVE CVE-2020-24588 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25639/</URL>
      <Description>SUSE CVE CVE-2020-25639 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25656/</URL>
      <Description>SUSE CVE CVE-2020-25656 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25668/</URL>
      <Description>SUSE CVE CVE-2020-25668 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-26141/</URL>
      <Description>SUSE CVE CVE-2020-26141 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-2732/</URL>
      <Description>SUSE CVE CVE-2020-2732 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29660/</URL>
      <Description>SUSE CVE CVE-2020-29660 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29661/</URL>
      <Description>SUSE CVE CVE-2020-29661 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-8648/</URL>
      <Description>SUSE CVE CVE-2020-8648 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-8694/</URL>
      <Description>SUSE CVE CVE-2020-8694 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-23133/</URL>
      <Description>SUSE CVE CVE-2021-23133 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-26708/</URL>
      <Description>SUSE CVE CVE-2021-26708 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-28971/</URL>
      <Description>SUSE CVE CVE-2021-28971 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-32606/</URL>
      <Description>SUSE CVE CVE-2021-32606 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-33909/</URL>
      <Description>SUSE CVE CVE-2021-33909 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3483/</URL>
      <Description>SUSE CVE CVE-2021-3483 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3489/</URL>
      <Description>SUSE CVE CVE-2021-3489 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3490/</URL>
      <Description>SUSE CVE CVE-2021-3490 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3491/</URL>
      <Description>SUSE CVE CVE-2021-3491 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3640/</URL>
      <Description>SUSE CVE CVE-2021-3640 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3653/</URL>
      <Description>SUSE CVE CVE-2021-3653 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3656/</URL>
      <Description>SUSE CVE CVE-2021-3656 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3744/</URL>
      <Description>SUSE CVE CVE-2021-3744 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3753/</URL>
      <Description>SUSE CVE CVE-2021-3753 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-37576/</URL>
      <Description>SUSE CVE CVE-2021-37576 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3759/</URL>
      <Description>SUSE CVE CVE-2021-3759 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-38166/</URL>
      <Description>SUSE CVE CVE-2021-38166 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-5.14.6-1.4">
      <FullProductName ProductID="kernel-devel-5.14.6-1.4">kernel-devel-5.14.6-1.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-macros-5.14.6-1.4">
      <FullProductName ProductID="kernel-macros-5.14.6-1.4">kernel-macros-5.14.6-1.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-5.14.6-1.4">
      <FullProductName ProductID="kernel-source-5.14.6-1.4">kernel-source-5.14.6-1.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-vanilla-5.14.6-1.4">
      <FullProductName ProductID="kernel-source-vanilla-5.14.6-1.4">kernel-source-vanilla-5.14.6-1.4</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-devel-5.14.6-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-devel-5.14.6-1.4">kernel-devel-5.14.6-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-5.14.6-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-macros-5.14.6-1.4">kernel-macros-5.14.6-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-5.14.6-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-source-5.14.6-1.4">kernel-source-5.14.6-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-vanilla-5.14.6-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4">kernel-source-vanilla-5.14.6-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.</Note>
    </Notes>
    <CVE>CVE-2017-1000251</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.7</BaseScore>
        <Vector>AV:A/AC:L/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-1000251.html</URL>
        <Description>CVE-2017-1000251</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057389</URL>
        <Description>SUSE Bug 1057389</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057950</URL>
        <Description>SUSE Bug 1057950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1070535</URL>
        <Description>SUSE Bug 1070535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1072117</URL>
        <Description>SUSE Bug 1072117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1072162</URL>
        <Description>SUSE Bug 1072162</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120758</URL>
        <Description>SUSE Bug 1120758</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.</Note>
    </Notes>
    <CVE>CVE-2017-12153</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12153.html</URL>
        <Description>CVE-2017-12153</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1058410</URL>
        <Description>SUSE Bug 1058410</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1058624</URL>
        <Description>SUSE Bug 1058624</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.</Note>
    </Notes>
    <CVE>CVE-2017-13080</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:C/I:C/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13080.html</URL>
        <Description>CVE-2017-13080</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056061</URL>
        <Description>SUSE Bug 1056061</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1063479</URL>
        <Description>SUSE Bug 1063479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1063667</URL>
        <Description>SUSE Bug 1063667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1063671</URL>
        <Description>SUSE Bug 1063671</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1066295</URL>
        <Description>SUSE Bug 1066295</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105108</URL>
        <Description>SUSE Bug 1105108</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178872</URL>
        <Description>SUSE Bug 1178872</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179588</URL>
        <Description>SUSE Bug 1179588</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.</Note>
    </Notes>
    <CVE>CVE-2017-14051</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14051.html</URL>
        <Description>CVE-2017-14051</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056588</URL>
        <Description>SUSE Bug 1056588</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.</Note>
    </Notes>
    <CVE>CVE-2017-15129</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15129.html</URL>
        <Description>CVE-2017-15129</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074839</URL>
        <Description>SUSE Bug 1074839</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.</Note>
    </Notes>
    <CVE>CVE-2017-15265</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15265.html</URL>
        <Description>CVE-2017-15265</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1062520</URL>
        <Description>SUSE Bug 1062520</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.</Note>
    </Notes>
    <CVE>CVE-2017-16536</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16536.html</URL>
        <Description>CVE-2017-16536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1066606</URL>
        <Description>SUSE Bug 1066606</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146519</URL>
        <Description>SUSE Bug 1146519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.</Note>
    </Notes>
    <CVE>CVE-2017-16537</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16537.html</URL>
        <Description>CVE-2017-16537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1066573</URL>
        <Description>SUSE Bug 1066573</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146519</URL>
        <Description>SUSE Bug 1146519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.</Note>
    </Notes>
    <CVE>CVE-2017-16645</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16645.html</URL>
        <Description>CVE-2017-16645</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1067132</URL>
        <Description>SUSE Bug 1067132</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146519</URL>
        <Description>SUSE Bug 1146519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.</Note>
    </Notes>
    <CVE>CVE-2017-16646</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16646.html</URL>
        <Description>CVE-2017-16646</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1067105</URL>
        <Description>SUSE Bug 1067105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146519</URL>
        <Description>SUSE Bug 1146519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.</Note>
    </Notes>
    <CVE>CVE-2017-16647</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16647.html</URL>
        <Description>CVE-2017-16647</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1067102</URL>
        <Description>SUSE Bug 1067102</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146519</URL>
        <Description>SUSE Bug 1146519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.</Note>
    </Notes>
    <CVE>CVE-2017-16648</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16648.html</URL>
        <Description>CVE-2017-16648</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1067087</URL>
        <Description>SUSE Bug 1067087</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146519</URL>
        <Description>SUSE Bug 1146519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.</Note>
    </Notes>
    <CVE>CVE-2017-16995</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16995.html</URL>
        <Description>CVE-2017-16995</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1073928</URL>
        <Description>SUSE Bug 1073928</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.</Note>
    </Notes>
    <CVE>CVE-2017-16996</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16996.html</URL>
        <Description>CVE-2017-16996</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1073928</URL>
        <Description>SUSE Bug 1073928</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.</Note>
    </Notes>
    <CVE>CVE-2017-17448</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-17448.html</URL>
        <Description>CVE-2017-17448</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1071693</URL>
        <Description>SUSE Bug 1071693</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.</Note>
    </Notes>
    <CVE>CVE-2017-17449</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-17449.html</URL>
        <Description>CVE-2017-17449</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1071694</URL>
        <Description>SUSE Bug 1071694</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.</Note>
    </Notes>
    <CVE>CVE-2017-17450</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.2</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-17450.html</URL>
        <Description>CVE-2017-17450</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1071695</URL>
        <Description>SUSE Bug 1071695</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074033</URL>
        <Description>SUSE Bug 1074033</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.</Note>
    </Notes>
    <CVE>CVE-2017-17852</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-17852.html</URL>
        <Description>CVE-2017-17852</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1073928</URL>
        <Description>SUSE Bug 1073928</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.</Note>
    </Notes>
    <CVE>CVE-2017-17853</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-17853.html</URL>
        <Description>CVE-2017-17853</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1073928</URL>
        <Description>SUSE Bug 1073928</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.</Note>
    </Notes>
    <CVE>CVE-2017-17854</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-17854.html</URL>
        <Description>CVE-2017-17854</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1073928</URL>
        <Description>SUSE Bug 1073928</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.</Note>
    </Notes>
    <CVE>CVE-2017-17855</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-17855.html</URL>
        <Description>CVE-2017-17855</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1073928</URL>
        <Description>SUSE Bug 1073928</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.</Note>
    </Notes>
    <CVE>CVE-2017-17856</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-17856.html</URL>
        <Description>CVE-2017-17856</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1073928</URL>
        <Description>SUSE Bug 1073928</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.</Note>
    </Notes>
    <CVE>CVE-2017-17857</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-17857.html</URL>
        <Description>CVE-2017-17857</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1073928</URL>
        <Description>SUSE Bug 1073928</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.</Note>
    </Notes>
    <CVE>CVE-2017-17862</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-17862.html</URL>
        <Description>CVE-2017-17862</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1073928</URL>
        <Description>SUSE Bug 1073928</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.</Note>
    </Notes>
    <CVE>CVE-2017-5123</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5123.html</URL>
        <Description>CVE-2017-5123</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1062473</URL>
        <Description>SUSE Bug 1062473</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122971</URL>
        <Description>SUSE Bug 1122971</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.</Note>
    </Notes>
    <CVE>CVE-2017-5715</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5715.html</URL>
        <Description>CVE-2017-5715</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1068032</URL>
        <Description>SUSE Bug 1068032</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074562</URL>
        <Description>SUSE Bug 1074562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074578</URL>
        <Description>SUSE Bug 1074578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074701</URL>
        <Description>SUSE Bug 1074701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074741</URL>
        <Description>SUSE Bug 1074741</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074919</URL>
        <Description>SUSE Bug 1074919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075006</URL>
        <Description>SUSE Bug 1075006</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075007</URL>
        <Description>SUSE Bug 1075007</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075262</URL>
        <Description>SUSE Bug 1075262</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075419</URL>
        <Description>SUSE Bug 1075419</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076115</URL>
        <Description>SUSE Bug 1076115</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076372</URL>
        <Description>SUSE Bug 1076372</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076606</URL>
        <Description>SUSE Bug 1076606</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078353</URL>
        <Description>SUSE Bug 1078353</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1080039</URL>
        <Description>SUSE Bug 1080039</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087887</URL>
        <Description>SUSE Bug 1087887</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087939</URL>
        <Description>SUSE Bug 1087939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088147</URL>
        <Description>SUSE Bug 1088147</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089055</URL>
        <Description>SUSE Bug 1089055</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1091815</URL>
        <Description>SUSE Bug 1091815</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1095735</URL>
        <Description>SUSE Bug 1095735</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1102517</URL>
        <Description>SUSE Bug 1102517</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105108</URL>
        <Description>SUSE Bug 1105108</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126516</URL>
        <Description>SUSE Bug 1126516</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173489</URL>
        <Description>SUSE Bug 1173489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201457</URL>
        <Description>SUSE Bug 1201457</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203236</URL>
        <Description>SUSE Bug 1203236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.</Note>
    </Notes>
    <CVE>CVE-2017-5753</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5753.html</URL>
        <Description>CVE-2017-5753</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1068032</URL>
        <Description>SUSE Bug 1068032</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074562</URL>
        <Description>SUSE Bug 1074562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074578</URL>
        <Description>SUSE Bug 1074578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074701</URL>
        <Description>SUSE Bug 1074701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075006</URL>
        <Description>SUSE Bug 1075006</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075419</URL>
        <Description>SUSE Bug 1075419</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075748</URL>
        <Description>SUSE Bug 1075748</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1080039</URL>
        <Description>SUSE Bug 1080039</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087084</URL>
        <Description>SUSE Bug 1087084</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087939</URL>
        <Description>SUSE Bug 1087939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089055</URL>
        <Description>SUSE Bug 1089055</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1136865</URL>
        <Description>SUSE Bug 1136865</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1209547</URL>
        <Description>SUSE Bug 1209547</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.</Note>
    </Notes>
    <CVE>CVE-2017-5754</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5754.html</URL>
        <Description>CVE-2017-5754</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1068032</URL>
        <Description>SUSE Bug 1068032</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074562</URL>
        <Description>SUSE Bug 1074562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074578</URL>
        <Description>SUSE Bug 1074578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074701</URL>
        <Description>SUSE Bug 1074701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075006</URL>
        <Description>SUSE Bug 1075006</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075008</URL>
        <Description>SUSE Bug 1075008</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087939</URL>
        <Description>SUSE Bug 1087939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089055</URL>
        <Description>SUSE Bug 1089055</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115045</URL>
        <Description>SUSE Bug 1115045</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1136865</URL>
        <Description>SUSE Bug 1136865</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.</Note>
    </Notes>
    <CVE>CVE-2017-7541</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7541.html</URL>
        <Description>CVE-2017-7541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049645</URL>
        <Description>SUSE Bug 1049645</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.</Note>
    </Notes>
    <CVE>CVE-2017-7542</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7542.html</URL>
        <Description>CVE-2017-7542</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049882</URL>
        <Description>SUSE Bug 1049882</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1061936</URL>
        <Description>SUSE Bug 1061936</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.</Note>
    </Notes>
    <CVE>CVE-2017-8824</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8824.html</URL>
        <Description>CVE-2017-8824</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1070771</URL>
        <Description>SUSE Bug 1070771</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076734</URL>
        <Description>SUSE Bug 1076734</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092904</URL>
        <Description>SUSE Bug 1092904</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a "double fetch" vulnerability.</Note>
    </Notes>
    <CVE>CVE-2017-8831</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.6</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8831.html</URL>
        <Description>CVE-2017-8831</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1037994</URL>
        <Description>SUSE Bug 1037994</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1061936</URL>
        <Description>SUSE Bug 1061936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.</Note>
    </Notes>
    <CVE>CVE-2018-1000004</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1000004.html</URL>
        <Description>CVE-2018-1000004</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076017</URL>
        <Description>SUSE Bug 1076017</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1091815</URL>
        <Description>SUSE Bug 1091815</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.</Note>
    </Notes>
    <CVE>CVE-2018-10322</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10322.html</URL>
        <Description>CVE-2018-10322</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090749</URL>
        <Description>SUSE Bug 1090749</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.</Note>
    </Notes>
    <CVE>CVE-2018-10323</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10323.html</URL>
        <Description>CVE-2018-10323</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090717</URL>
        <Description>SUSE Bug 1090717</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.</Note>
    </Notes>
    <CVE>CVE-2018-1068</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1068.html</URL>
        <Description>CVE-2018-1068</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085107</URL>
        <Description>SUSE Bug 1085107</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085114</URL>
        <Description>SUSE Bug 1085114</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123903</URL>
        <Description>SUSE Bug 1123903</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.</Note>
    </Notes>
    <CVE>CVE-2018-1118</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1118.html</URL>
        <Description>CVE-2018-1118</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092472</URL>
        <Description>SUSE Bug 1092472</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat's execution, leading to a NULL pointer dereference and system crash.</Note>
    </Notes>
    <CVE>CVE-2018-12232</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12232.html</URL>
        <Description>CVE-2018-12232</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097593</URL>
        <Description>SUSE Bug 1097593</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125907</URL>
        <Description>SUSE Bug 1125907</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1127757</URL>
        <Description>SUSE Bug 1127757</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via crafted perf_event_open and mmap system calls.</Note>
    </Notes>
    <CVE>CVE-2018-12714</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12714.html</URL>
        <Description>CVE-2018-12714</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098933</URL>
        <Description>SUSE Bug 1098933</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.</Note>
    </Notes>
    <CVE>CVE-2018-13053</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-13053.html</URL>
        <Description>CVE-2018-13053</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1099924</URL>
        <Description>SUSE Bug 1099924</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.</Note>
    </Notes>
    <CVE>CVE-2018-18710</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18710.html</URL>
        <Description>CVE-2018-18710</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1113751</URL>
        <Description>SUSE Bug 1113751</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.</Note>
    </Notes>
    <CVE>CVE-2018-19824</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19824.html</URL>
        <Description>CVE-2018-19824</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118152</URL>
        <Description>SUSE Bug 1118152</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).</Note>
    </Notes>
    <CVE>CVE-2018-5332</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5332.html</URL>
        <Description>CVE-2018-5332</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075621</URL>
        <Description>SUSE Bug 1075621</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1091815</URL>
        <Description>SUSE Bug 1091815</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2018-5333</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5333.html</URL>
        <Description>CVE-2018-5333</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075617</URL>
        <Description>SUSE Bug 1075617</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1091815</URL>
        <Description>SUSE Bug 1091815</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).</Note>
    </Notes>
    <CVE>CVE-2018-8043</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-8043.html</URL>
        <Description>CVE-2018-8043</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1084829</URL>
        <Description>SUSE Bug 1084829</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.</Note>
    </Notes>
    <CVE>CVE-2018-8087</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-8087.html</URL>
        <Description>CVE-2018-8087</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085053</URL>
        <Description>SUSE Bug 1085053</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.</Note>
    </Notes>
    <CVE>CVE-2018-8822</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-8822.html</URL>
        <Description>CVE-2018-8822</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1086162</URL>
        <Description>SUSE Bug 1086162</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090404</URL>
        <Description>SUSE Bug 1090404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1091815</URL>
        <Description>SUSE Bug 1091815</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel's Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.</Note>
    </Notes>
    <CVE>CVE-2019-10207</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10207.html</URL>
        <Description>CVE-2019-10207</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123959</URL>
        <Description>SUSE Bug 1123959</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1142857</URL>
        <Description>SUSE Bug 1142857</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.</Note>
    </Notes>
    <CVE>CVE-2019-11477</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11477.html</URL>
        <Description>CVE-2019-11477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132686</URL>
        <Description>SUSE Bug 1132686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1137586</URL>
        <Description>SUSE Bug 1137586</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1142129</URL>
        <Description>SUSE Bug 1142129</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153242</URL>
        <Description>SUSE Bug 1153242</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.</Note>
    </Notes>
    <CVE>CVE-2019-11478</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11478.html</URL>
        <Description>CVE-2019-11478</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132686</URL>
        <Description>SUSE Bug 1132686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1137586</URL>
        <Description>SUSE Bug 1137586</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1142129</URL>
        <Description>SUSE Bug 1142129</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1143542</URL>
        <Description>SUSE Bug 1143542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.</Note>
    </Notes>
    <CVE>CVE-2019-11479</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11479.html</URL>
        <Description>CVE-2019-11479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132686</URL>
        <Description>SUSE Bug 1132686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1137586</URL>
        <Description>SUSE Bug 1137586</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1142129</URL>
        <Description>SUSE Bug 1142129</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1143542</URL>
        <Description>SUSE Bug 1143542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.</Note>
    </Notes>
    <CVE>CVE-2019-14615</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-14615.html</URL>
        <Description>CVE-2019-14615</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160195</URL>
        <Description>SUSE Bug 1160195</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165881</URL>
        <Description>SUSE Bug 1165881</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.</Note>
    </Notes>
    <CVE>CVE-2019-14814</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-14814.html</URL>
        <Description>CVE-2019-14814</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146512</URL>
        <Description>SUSE Bug 1146512</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173664</URL>
        <Description>SUSE Bug 1173664</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173665</URL>
        <Description>SUSE Bug 1173665</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.</Note>
    </Notes>
    <CVE>CVE-2019-14896</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-14896.html</URL>
        <Description>CVE-2019-14896</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1157157</URL>
        <Description>SUSE Bug 1157157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160468</URL>
        <Description>SUSE Bug 1160468</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.</Note>
    </Notes>
    <CVE>CVE-2019-15030</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-15030.html</URL>
        <Description>CVE-2019-15030</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149713</URL>
        <Description>SUSE Bug 1149713</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.</Note>
    </Notes>
    <CVE>CVE-2019-15031</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-15031.html</URL>
        <Description>CVE-2019-15031</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149713</URL>
        <Description>SUSE Bug 1149713</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.</Note>
    </Notes>
    <CVE>CVE-2019-15098</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-15098.html</URL>
        <Description>CVE-2019-15098</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146378</URL>
        <Description>SUSE Bug 1146378</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146543</URL>
        <Description>SUSE Bug 1146543</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="58">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.</Note>
    </Notes>
    <CVE>CVE-2019-15099</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-15099.html</URL>
        <Description>CVE-2019-15099</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146368</URL>
        <Description>SUSE Bug 1146368</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="59">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2019-15290</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-15290.html</URL>
        <Description>CVE-2019-15290</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146378</URL>
        <Description>SUSE Bug 1146378</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146519</URL>
        <Description>SUSE Bug 1146519</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146543</URL>
        <Description>SUSE Bug 1146543</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158381</URL>
        <Description>SUSE Bug 1158381</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158834</URL>
        <Description>SUSE Bug 1158834</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="60">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).</Note>
    </Notes>
    <CVE>CVE-2019-15504</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-15504.html</URL>
        <Description>CVE-2019-15504</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1147116</URL>
        <Description>SUSE Bug 1147116</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185852</URL>
        <Description>SUSE Bug 1185852</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="61">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream "x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.</Note>
    </Notes>
    <CVE>CVE-2019-15902</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-15902.html</URL>
        <Description>CVE-2019-15902</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149376</URL>
        <Description>SUSE Bug 1149376</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155131</URL>
        <Description>SUSE Bug 1155131</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="62">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2019-16231</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-16231.html</URL>
        <Description>CVE-2019-16231</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1150466</URL>
        <Description>SUSE Bug 1150466</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="63">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2019-16232</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-16232.html</URL>
        <Description>CVE-2019-16232</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1150465</URL>
        <Description>SUSE Bug 1150465</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="64">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2019-16234</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-16234.html</URL>
        <Description>CVE-2019-16234</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1150452</URL>
        <Description>SUSE Bug 1150452</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="65">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.</Note>
    </Notes>
    <CVE>CVE-2019-17133</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-17133.html</URL>
        <Description>CVE-2019-17133</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153158</URL>
        <Description>SUSE Bug 1153158</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153161</URL>
        <Description>SUSE Bug 1153161</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="66">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2019-17666</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>8.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-17666.html</URL>
        <Description>CVE-2019-17666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154372</URL>
        <Description>SUSE Bug 1154372</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="67">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.</Note>
    </Notes>
    <CVE>CVE-2019-18808</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-18808.html</URL>
        <Description>CVE-2019-18808</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156259</URL>
        <Description>SUSE Bug 1156259</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189884</URL>
        <Description>SUSE Bug 1189884</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1190534</URL>
        <Description>SUSE Bug 1190534</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="68">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.</Note>
    </Notes>
    <CVE>CVE-2019-18812</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-18812.html</URL>
        <Description>CVE-2019-18812</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156277</URL>
        <Description>SUSE Bug 1156277</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="69">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.</Note>
    </Notes>
    <CVE>CVE-2019-18813</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-18813.html</URL>
        <Description>CVE-2019-18813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156278</URL>
        <Description>SUSE Bug 1156278</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="70">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.</Note>
    </Notes>
    <CVE>CVE-2019-19252</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19252.html</URL>
        <Description>CVE-2019-19252</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1157813</URL>
        <Description>SUSE Bug 1157813</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="71">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service.</Note>
    </Notes>
    <CVE>CVE-2019-19332</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19332.html</URL>
        <Description>CVE-2019-19332</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158827</URL>
        <Description>SUSE Bug 1158827</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="72">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.</Note>
    </Notes>
    <CVE>CVE-2019-19338</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19338.html</URL>
        <Description>CVE-2019-19338</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158954</URL>
        <Description>SUSE Bug 1158954</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="73">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.</Note>
    </Notes>
    <CVE>CVE-2019-3016</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3016.html</URL>
        <Description>CVE-2019-3016</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159281</URL>
        <Description>SUSE Bug 1159281</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1161154</URL>
        <Description>SUSE Bug 1161154</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="74">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.</Note>
    </Notes>
    <CVE>CVE-2019-3846</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>8.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3846.html</URL>
        <Description>CVE-2019-3846</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1136424</URL>
        <Description>SUSE Bug 1136424</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1136446</URL>
        <Description>SUSE Bug 1136446</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156330</URL>
        <Description>SUSE Bug 1156330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="75">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.</Note>
    </Notes>
    <CVE>CVE-2019-3882</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3882.html</URL>
        <Description>CVE-2019-3882</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131416</URL>
        <Description>SUSE Bug 1131416</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131427</URL>
        <Description>SUSE Bug 1131427</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1133319</URL>
        <Description>SUSE Bug 1133319</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="76">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0's APIC register values via L2 guest, when 'virtualize x2APIC mode' is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.</Note>
    </Notes>
    <CVE>CVE-2019-3887</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3887.html</URL>
        <Description>CVE-2019-3887</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131800</URL>
        <Description>SUSE Bug 1131800</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="77">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.</Note>
    </Notes>
    <CVE>CVE-2019-6974</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6974.html</URL>
        <Description>CVE-2019-6974</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1124728</URL>
        <Description>SUSE Bug 1124728</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1124729</URL>
        <Description>SUSE Bug 1124729</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="78">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.</Note>
    </Notes>
    <CVE>CVE-2019-7221</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-7221.html</URL>
        <Description>CVE-2019-7221</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1124732</URL>
        <Description>SUSE Bug 1124732</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1124734</URL>
        <Description>SUSE Bug 1124734</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="79">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.</Note>
    </Notes>
    <CVE>CVE-2019-7222</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-7222.html</URL>
        <Description>CVE-2019-7222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1124735</URL>
        <Description>SUSE Bug 1124735</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="80">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.</Note>
    </Notes>
    <CVE>CVE-2019-8564</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8564.html</URL>
        <Description>CVE-2019-8564</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132673</URL>
        <Description>SUSE Bug 1132673</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132828</URL>
        <Description>SUSE Bug 1132828</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="81">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.</Note>
    </Notes>
    <CVE>CVE-2019-8912</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8912.html</URL>
        <Description>CVE-2019-8912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125907</URL>
        <Description>SUSE Bug 1125907</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126284</URL>
        <Description>SUSE Bug 1126284</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="82">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.</Note>
    </Notes>
    <CVE>CVE-2019-9500</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9500.html</URL>
        <Description>CVE-2019-9500</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132681</URL>
        <Description>SUSE Bug 1132681</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="83">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.</Note>
    </Notes>
    <CVE>CVE-2020-10135</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.8</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10135.html</URL>
        <Description>CVE-2020-10135</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171988</URL>
        <Description>SUSE Bug 1171988</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="84">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.</Note>
    </Notes>
    <CVE>CVE-2020-10766</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10766.html</URL>
        <Description>CVE-2020-10766</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159281</URL>
        <Description>SUSE Bug 1159281</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172781</URL>
        <Description>SUSE Bug 1172781</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="85">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.</Note>
    </Notes>
    <CVE>CVE-2020-10767</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10767.html</URL>
        <Description>CVE-2020-10767</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159281</URL>
        <Description>SUSE Bug 1159281</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172782</URL>
        <Description>SUSE Bug 1172782</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="86">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.</Note>
    </Notes>
    <CVE>CVE-2020-10768</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10768.html</URL>
        <Description>CVE-2020-10768</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159281</URL>
        <Description>SUSE Bug 1159281</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172783</URL>
        <Description>SUSE Bug 1172783</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="87">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.</Note>
    </Notes>
    <CVE>CVE-2020-12351</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-12351.html</URL>
        <Description>CVE-2020-12351</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177724</URL>
        <Description>SUSE Bug 1177724</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177729</URL>
        <Description>SUSE Bug 1177729</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178397</URL>
        <Description>SUSE Bug 1178397</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="88">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.</Note>
    </Notes>
    <CVE>CVE-2020-12352</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-12352.html</URL>
        <Description>CVE-2020-12352</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177725</URL>
        <Description>SUSE Bug 1177725</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178398</URL>
        <Description>SUSE Bug 1178398</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="89">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel's implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2020-14331</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14331.html</URL>
        <Description>CVE-2020-14331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174205</URL>
        <Description>SUSE Bug 1174205</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174247</URL>
        <Description>SUSE Bug 1174247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="90">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.</Note>
    </Notes>
    <CVE>CVE-2020-14386</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14386.html</URL>
        <Description>CVE-2020-14386</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176069</URL>
        <Description>SUSE Bug 1176069</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176072</URL>
        <Description>SUSE Bug 1176072</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="91">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.</Note>
    </Notes>
    <CVE>CVE-2020-24586</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-24586.html</URL>
        <Description>CVE-2020-24586</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185859</URL>
        <Description>SUSE Bug 1185859</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192868</URL>
        <Description>SUSE Bug 1192868</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="92">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.</Note>
    </Notes>
    <CVE>CVE-2020-24587</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.8</BaseScore>
        <Vector>AV:A/AC:H/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-24587.html</URL>
        <Description>CVE-2020-24587</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185859</URL>
        <Description>SUSE Bug 1185859</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185862</URL>
        <Description>SUSE Bug 1185862</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192868</URL>
        <Description>SUSE Bug 1192868</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="93">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.</Note>
    </Notes>
    <CVE>CVE-2020-24588</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-24588.html</URL>
        <Description>CVE-2020-24588</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185861</URL>
        <Description>SUSE Bug 1185861</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192868</URL>
        <Description>SUSE Bug 1192868</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199701</URL>
        <Description>SUSE Bug 1199701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="94">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A NULL pointer dereference flaw was found in the Linux kernel's GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.</Note>
    </Notes>
    <CVE>CVE-2020-25639</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25639.html</URL>
        <Description>CVE-2020-25639</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176846</URL>
        <Description>SUSE Bug 1176846</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="95">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.</Note>
    </Notes>
    <CVE>CVE-2020-25656</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25656.html</URL>
        <Description>CVE-2020-25656</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177766</URL>
        <Description>SUSE Bug 1177766</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="96">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.</Note>
    </Notes>
    <CVE>CVE-2020-25668</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25668.html</URL>
        <Description>CVE-2020-25668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178123</URL>
        <Description>SUSE Bug 1178123</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178622</URL>
        <Description>SUSE Bug 1178622</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196914</URL>
        <Description>SUSE Bug 1196914</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="97">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.</Note>
    </Notes>
    <CVE>CVE-2020-26141</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-26141.html</URL>
        <Description>CVE-2020-26141</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185987</URL>
        <Description>SUSE Bug 1185987</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="98">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.</Note>
    </Notes>
    <CVE>CVE-2020-2732</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.3</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-2732.html</URL>
        <Description>CVE-2020-2732</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1163971</URL>
        <Description>SUSE Bug 1163971</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="99">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.</Note>
    </Notes>
    <CVE>CVE-2020-29660</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29660.html</URL>
        <Description>CVE-2020-29660</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179745</URL>
        <Description>SUSE Bug 1179745</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179877</URL>
        <Description>SUSE Bug 1179877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="100">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.</Note>
    </Notes>
    <CVE>CVE-2020-29661</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29661.html</URL>
        <Description>CVE-2020-29661</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179745</URL>
        <Description>SUSE Bug 1179745</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179877</URL>
        <Description>SUSE Bug 1179877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214268</URL>
        <Description>SUSE Bug 1214268</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218966</URL>
        <Description>SUSE Bug 1218966</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="101">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.</Note>
    </Notes>
    <CVE>CVE-2020-8648</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-8648.html</URL>
        <Description>CVE-2020-8648</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162928</URL>
        <Description>SUSE Bug 1162928</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="102">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.</Note>
    </Notes>
    <CVE>CVE-2020-8694</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-8694.html</URL>
        <Description>CVE-2020-8694</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1170415</URL>
        <Description>SUSE Bug 1170415</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1170446</URL>
        <Description>SUSE Bug 1170446</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178591</URL>
        <Description>SUSE Bug 1178591</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178700</URL>
        <Description>SUSE Bug 1178700</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179661</URL>
        <Description>SUSE Bug 1179661</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="103">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-&gt;sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.</Note>
    </Notes>
    <CVE>CVE-2021-23133</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-23133.html</URL>
        <Description>CVE-2021-23133</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184675</URL>
        <Description>SUSE Bug 1184675</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185901</URL>
        <Description>SUSE Bug 1185901</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="104">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.</Note>
    </Notes>
    <CVE>CVE-2021-26708</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-26708.html</URL>
        <Description>CVE-2021-26708</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181806</URL>
        <Description>SUSE Bug 1181806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183298</URL>
        <Description>SUSE Bug 1183298</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="105">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.</Note>
    </Notes>
    <CVE>CVE-2021-28971</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-28971.html</URL>
        <Description>CVE-2021-28971</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184196</URL>
        <Description>SUSE Bug 1184196</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="106">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)</Note>
    </Notes>
    <CVE>CVE-2021-32606</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-32606.html</URL>
        <Description>CVE-2021-32606</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185953</URL>
        <Description>SUSE Bug 1185953</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="107">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.</Note>
    </Notes>
    <CVE>CVE-2021-33909</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-33909.html</URL>
        <Description>CVE-2021-33909</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188062</URL>
        <Description>SUSE Bug 1188062</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188063</URL>
        <Description>SUSE Bug 1188063</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188257</URL>
        <Description>SUSE Bug 1188257</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189302</URL>
        <Description>SUSE Bug 1189302</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1190859</URL>
        <Description>SUSE Bug 1190859</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="108">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected</Note>
    </Notes>
    <CVE>CVE-2021-3483</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3483.html</URL>
        <Description>CVE-2021-3483</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184393</URL>
        <Description>SUSE Bug 1184393</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="109">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee ("bpf, ringbuf: Deny reserve of buffers larger than ringbuf") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 ("bpf: Implement BPF ring buffer and verifier support for it") (v5.8-rc1).</Note>
    </Notes>
    <CVE>CVE-2021-3489</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3489.html</URL>
        <Description>CVE-2021-3489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185640</URL>
        <Description>SUSE Bug 1185640</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185856</URL>
        <Description>SUSE Bug 1185856</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="110">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e ("bpf: Fix alu32 const subreg bound tracking on bitwise operations") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 ("bpf: Verifier, do explicit ALU32 bounds tracking") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 ("bpf:Fix a verifier failure with xor") ( 5.10-rc1).</Note>
    </Notes>
    <CVE>CVE-2021-3490</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3490.html</URL>
        <Description>CVE-2021-3490</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185641</URL>
        <Description>SUSE Bug 1185641</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185796</URL>
        <Description>SUSE Bug 1185796</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="111">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/&lt;PID&gt;/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b ("io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c ("io_uring: add IORING_OP_PROVIDE_BUFFERS") (v5.7-rc1).</Note>
    </Notes>
    <CVE>CVE-2021-3491</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3491.html</URL>
        <Description>CVE-2021-3491</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185642</URL>
        <Description>SUSE Bug 1185642</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1187090</URL>
        <Description>SUSE Bug 1187090</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="112">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.</Note>
    </Notes>
    <CVE>CVE-2021-3640</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3640.html</URL>
        <Description>CVE-2021-3640</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188172</URL>
        <Description>SUSE Bug 1188172</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188613</URL>
        <Description>SUSE Bug 1188613</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191530</URL>
        <Description>SUSE Bug 1191530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196810</URL>
        <Description>SUSE Bug 1196810</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196914</URL>
        <Description>SUSE Bug 1196914</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="113">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.</Note>
    </Notes>
    <CVE>CVE-2021-3653</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3653.html</URL>
        <Description>CVE-2021-3653</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189399</URL>
        <Description>SUSE Bug 1189399</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189420</URL>
        <Description>SUSE Bug 1189420</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196914</URL>
        <Description>SUSE Bug 1196914</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="114">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.</Note>
    </Notes>
    <CVE>CVE-2021-3656</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3656.html</URL>
        <Description>CVE-2021-3656</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189400</URL>
        <Description>SUSE Bug 1189400</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189418</URL>
        <Description>SUSE Bug 1189418</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="115">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.</Note>
    </Notes>
    <CVE>CVE-2021-3744</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3744.html</URL>
        <Description>CVE-2021-3744</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189884</URL>
        <Description>SUSE Bug 1189884</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1190534</URL>
        <Description>SUSE Bug 1190534</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="116">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.</Note>
    </Notes>
    <CVE>CVE-2021-3753</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3753.html</URL>
        <Description>CVE-2021-3753</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1190025</URL>
        <Description>SUSE Bug 1190025</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="117">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.</Note>
    </Notes>
    <CVE>CVE-2021-37576</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-37576.html</URL>
        <Description>CVE-2021-37576</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188838</URL>
        <Description>SUSE Bug 1188838</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188842</URL>
        <Description>SUSE Bug 1188842</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1190276</URL>
        <Description>SUSE Bug 1190276</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="118">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory overflow vulnerability was found in the Linux kernel's ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.</Note>
    </Notes>
    <CVE>CVE-2021-3759</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3759.html</URL>
        <Description>CVE-2021-3759</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1190115</URL>
        <Description>SUSE Bug 1190115</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="119">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.</Note>
    </Notes>
    <CVE>CVE-2021-38166</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-devel-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-5.14.6-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-38166.html</URL>
        <Description>CVE-2021-38166</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189233</URL>
        <Description>SUSE Bug 1189233</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
