<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2020:14354-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-04-30T16:00:22Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-04-30T16:00:22Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-04-30T16:00:22Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-10942: In get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls (bsc#1167629).
- CVE-2020-8647: There was a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bsc#1162929).
- CVE-2020-8649: There was a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bsc#1162931).
- CVE-2020-9383: An issue was discovered set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it (bsc#1165111).
- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bsc#1159285).
- CVE-2020-11608: Fixed a NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints (bsc#1168829).
- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bsc#1162928).
- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in Marvell WiFi chip driver. A remote attacker could cause a denial of service or possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the Marvell WiFi chip driver. An attacker is able to cause a denial of service or possibly execute arbitrary code, when a STA works in IBSS mode and connects to another STA (bsc#1157155).
- CVE-2019-18675: Fixed an Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allowed local users to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation (bsc#1157804).
- CVE-2019-19965: Fixed a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition (bsc#1159911).
- CVE-2019-19066: A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c allowed attackers to cause a denial of service by triggering bfa_port_get_stats() failures (bsc#1157303).
- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bsc#1159908).
- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bsc#1159841).
- CVE-2019-19532: Fixed multiple out-of-bounds write bugs that can be caused by a malicious USB device (bsc#1158824).
- CVE-2019-19523: Fixed a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (bsc#115882).
- CVE-2019-19537: Fixed a race condition that can be caused by a malicious USB device in the USB character device driver layer (bsc#1158904).
- CVE-2019-19527, CVE-2019-19530, CVE-2019-19524: Fixed multiple use-after-free bug that could be caused by a malicious USB device (bsc#1158381, bsc#1158834, bsc#1158900).
- CVE-2019-15213: Fixed a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver (bsc#1146544).
- CVE-2019-19531: Fixed a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver (bsc#1158445).
- CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs (bsc#1157038).
- CVE-2019-19227: Fixed a potential NULL pointer dereference in the AppleTalk subsystem (bsc#1157678).
- CVE-2019-19074: Fixed a memory leak in the ath9k_wmi_cmd(), which allowed attackers to cause a denial of service (bsc#1157143).
- CVE-2019-19073: Fixed multiple memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c, which allowed attackers to cause a denial of service (bsc#1157070).
- CVE-2019-15916: Fixed a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which could cause denial of service (bsc#1149448).
- CVE-2019-12456: Fixed a denial of service in _ctl_ioctl_main, which could be triggered by a local user (bsc#1136922).

The following non-security bugs were fixed:

- Input: add safety guards to input_set_keycode() (bsc#1168075).
- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).
- blktrace: fix dereference after null check (bsc#1159285).
- blktrace: fix trace mutex deadlock (bsc#1159285).
- block: Fix oops scsi_disk_get() (bsc#1105327).
- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).
- kaiser: Fix for 32bit KAISER implementations (bsc#1157344).
- klist: fix starting point removed bug in klist iterators (bsc#1156652).
- kobject: Export kobject_get_unless_zero() (bsc#1105327).
- kobject: fix kset_find_obj() race with concurrent last kobject_put() (bsc#1105327).
- kref: minor cleanup (bsc#1105327).
- media: ov519: add missing endpoint sanity checks (bsc#1168829).
- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).
- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).
- powerpc/pseries/mobility: notify network peers after migration (bsc#1152631 ltc#181798).
- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).
- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).
- rpm/kernel-binary.spec.in: Replace Novell with SUSE
- sched: Fix race between task_group and sched_task_group (bsc#1136471).
- sched: Remove lockdep check in sched_move_task() (bsc#1136471).
- scsi: lpfc: Fix driver crash in target reset handler (bsc#1148871).
- writeback: fix race that cause writeback hung (bsc#1161358).
- x86: fix speculation bug reporting (bsc#1012382).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">slessp4-kernel-source-14354,slexsp3-kernel-source-14354</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      <Description>Link for SUSE-SU-2020:14354-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html</URL>
      <Description>E-Mail link for SUSE-SU-2020:14354-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1012382</URL>
      <Description>SUSE Bug 1012382</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1091041</URL>
      <Description>SUSE Bug 1091041</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1105327</URL>
      <Description>SUSE Bug 1105327</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1131107</URL>
      <Description>SUSE Bug 1131107</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1136471</URL>
      <Description>SUSE Bug 1136471</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1136922</URL>
      <Description>SUSE Bug 1136922</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1146519</URL>
      <Description>SUSE Bug 1146519</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1146544</URL>
      <Description>SUSE Bug 1146544</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1146612</URL>
      <Description>SUSE Bug 1146612</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1148871</URL>
      <Description>SUSE Bug 1148871</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1149448</URL>
      <Description>SUSE Bug 1149448</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1152631</URL>
      <Description>SUSE Bug 1152631</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1156652</URL>
      <Description>SUSE Bug 1156652</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1157038</URL>
      <Description>SUSE Bug 1157038</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1157070</URL>
      <Description>SUSE Bug 1157070</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1157143</URL>
      <Description>SUSE Bug 1157143</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1157155</URL>
      <Description>SUSE Bug 1157155</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1157157</URL>
      <Description>SUSE Bug 1157157</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1157303</URL>
      <Description>SUSE Bug 1157303</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1157344</URL>
      <Description>SUSE Bug 1157344</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1157678</URL>
      <Description>SUSE Bug 1157678</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1157804</URL>
      <Description>SUSE Bug 1157804</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1157923</URL>
      <Description>SUSE Bug 1157923</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158381</URL>
      <Description>SUSE Bug 1158381</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158410</URL>
      <Description>SUSE Bug 1158410</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158413</URL>
      <Description>SUSE Bug 1158413</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158427</URL>
      <Description>SUSE Bug 1158427</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158445</URL>
      <Description>SUSE Bug 1158445</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158823</URL>
      <Description>SUSE Bug 1158823</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158824</URL>
      <Description>SUSE Bug 1158824</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158834</URL>
      <Description>SUSE Bug 1158834</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158900</URL>
      <Description>SUSE Bug 1158900</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158904</URL>
      <Description>SUSE Bug 1158904</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1159285</URL>
      <Description>SUSE Bug 1159285</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1159841</URL>
      <Description>SUSE Bug 1159841</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1159908</URL>
      <Description>SUSE Bug 1159908</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1159911</URL>
      <Description>SUSE Bug 1159911</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1161358</URL>
      <Description>SUSE Bug 1161358</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1162928</URL>
      <Description>SUSE Bug 1162928</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1162929</URL>
      <Description>SUSE Bug 1162929</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1162931</URL>
      <Description>SUSE Bug 1162931</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1164078</URL>
      <Description>SUSE Bug 1164078</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1165111</URL>
      <Description>SUSE Bug 1165111</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1165985</URL>
      <Description>SUSE Bug 1165985</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1167629</URL>
      <Description>SUSE Bug 1167629</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1168075</URL>
      <Description>SUSE Bug 1168075</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1168829</URL>
      <Description>SUSE Bug 1168829</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1168854</URL>
      <Description>SUSE Bug 1168854</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-12456/</URL>
      <Description>SUSE CVE CVE-2019-12456 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-14896/</URL>
      <Description>SUSE CVE CVE-2019-14896 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-14897/</URL>
      <Description>SUSE CVE CVE-2019-14897 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-15213/</URL>
      <Description>SUSE CVE CVE-2019-15213 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-15916/</URL>
      <Description>SUSE CVE CVE-2019-15916 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-18660/</URL>
      <Description>SUSE CVE CVE-2019-18660 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-18675/</URL>
      <Description>SUSE CVE CVE-2019-18675 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19066/</URL>
      <Description>SUSE CVE CVE-2019-19066 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19073/</URL>
      <Description>SUSE CVE CVE-2019-19073 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19074/</URL>
      <Description>SUSE CVE CVE-2019-19074 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19227/</URL>
      <Description>SUSE CVE CVE-2019-19227 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19523/</URL>
      <Description>SUSE CVE CVE-2019-19523 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19524/</URL>
      <Description>SUSE CVE CVE-2019-19524 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19527/</URL>
      <Description>SUSE CVE CVE-2019-19527 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19530/</URL>
      <Description>SUSE CVE CVE-2019-19530 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19531/</URL>
      <Description>SUSE CVE CVE-2019-19531 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19532/</URL>
      <Description>SUSE CVE CVE-2019-19532 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19537/</URL>
      <Description>SUSE CVE CVE-2019-19537 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19768/</URL>
      <Description>SUSE CVE CVE-2019-19768 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19965/</URL>
      <Description>SUSE CVE CVE-2019-19965 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19966/</URL>
      <Description>SUSE CVE CVE-2019-19966 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-20096/</URL>
      <Description>SUSE CVE CVE-2019-20096 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10942/</URL>
      <Description>SUSE CVE CVE-2020-10942 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-11608/</URL>
      <Description>SUSE CVE CVE-2020-11608 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-8647/</URL>
      <Description>SUSE CVE CVE-2020-8647 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-8648/</URL>
      <Description>SUSE CVE CVE-2020-8648 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-8649/</URL>
      <Description>SUSE CVE CVE-2020-8649 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-9383/</URL>
      <Description>SUSE CVE CVE-2020-9383 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP4-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS" CPE="cpe:/o:suse:suse_sles:11:sp4">SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-bigmem-3.0.101-108.111.1">
      <FullProductName ProductID="kernel-bigmem-3.0.101-108.111.1">kernel-bigmem-3.0.101-108.111.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-bigmem-base-3.0.101-108.111.1">
      <FullProductName ProductID="kernel-bigmem-base-3.0.101-108.111.1">kernel-bigmem-base-3.0.101-108.111.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-bigmem-devel-3.0.101-108.111.1">
      <FullProductName ProductID="kernel-bigmem-devel-3.0.101-108.111.1">kernel-bigmem-devel-3.0.101-108.111.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-3.0.101-108.111.1">
      <FullProductName ProductID="kernel-default-3.0.101-108.111.1">kernel-default-3.0.101-108.111.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-3.0.101-108.111.1">
      <FullProductName ProductID="kernel-default-base-3.0.101-108.111.1">kernel-default-base-3.0.101-108.111.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-3.0.101-108.111.1">
      <FullProductName ProductID="kernel-default-devel-3.0.101-108.111.1">kernel-default-devel-3.0.101-108.111.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-man-3.0.101-108.111.1">
      <FullProductName ProductID="kernel-default-man-3.0.101-108.111.1">kernel-default-man-3.0.101-108.111.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-3.0.101-108.111.1">
      <FullProductName ProductID="kernel-ec2-3.0.101-108.111.1">kernel-ec2-3.0.101-108.111.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-base-3.0.101-108.111.1">
      <FullProductName ProductID="kernel-ec2-base-3.0.101-108.111.1">kernel-ec2-base-3.0.101-108.111.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-devel-3.0.101-108.111.1">
      <FullProductName ProductID="kernel-ec2-devel-3.0.101-108.111.1">kernel-ec2-devel-3.0.101-108.111.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-3.0.101-108.111.1">
      <FullProductName ProductID="kernel-pae-3.0.101-108.111.1">kernel-pae-3.0.101-108.111.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-base-3.0.101-108.111.1">
      <FullProductName ProductID="kernel-pae-base-3.0.101-108.111.1">kernel-pae-base-3.0.101-108.111.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-devel-3.0.101-108.111.1">
      <FullProductName ProductID="kernel-pae-devel-3.0.101-108.111.1">kernel-pae-devel-3.0.101-108.111.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ppc64-3.0.101-108.111.1">
      <FullProductName ProductID="kernel-ppc64-3.0.101-108.111.1">kernel-ppc64-3.0.101-108.111.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ppc64-base-3.0.101-108.111.1">
      <FullProductName ProductID="kernel-ppc64-base-3.0.101-108.111.1">kernel-ppc64-base-3.0.101-108.111.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ppc64-devel-3.0.101-108.111.1">
      <FullProductName ProductID="kernel-ppc64-devel-3.0.101-108.111.1">kernel-ppc64-devel-3.0.101-108.111.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-3.0.101-108.111.1">
      <FullProductName ProductID="kernel-source-3.0.101-108.111.1">kernel-source-3.0.101-108.111.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-3.0.101-108.111.1">
      <FullProductName ProductID="kernel-syms-3.0.101-108.111.1">kernel-syms-3.0.101-108.111.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-3.0.101-108.111.1">
      <FullProductName ProductID="kernel-trace-3.0.101-108.111.1">kernel-trace-3.0.101-108.111.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-base-3.0.101-108.111.1">
      <FullProductName ProductID="kernel-trace-base-3.0.101-108.111.1">kernel-trace-base-3.0.101-108.111.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-devel-3.0.101-108.111.1">
      <FullProductName ProductID="kernel-trace-devel-3.0.101-108.111.1">kernel-trace-devel-3.0.101-108.111.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-3.0.101-108.111.1">
      <FullProductName ProductID="kernel-xen-3.0.101-108.111.1">kernel-xen-3.0.101-108.111.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-base-3.0.101-108.111.1">
      <FullProductName ProductID="kernel-xen-base-3.0.101-108.111.1">kernel-xen-base-3.0.101-108.111.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-devel-3.0.101-108.111.1">
      <FullProductName ProductID="kernel-xen-devel-3.0.101-108.111.1">kernel-xen-devel-3.0.101-108.111.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-bigmem-3.0.101-108.111.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1">kernel-bigmem-3.0.101-108.111.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-bigmem-base-3.0.101-108.111.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1">kernel-bigmem-base-3.0.101-108.111.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-bigmem-devel-3.0.101-108.111.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1">kernel-bigmem-devel-3.0.101-108.111.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-3.0.101-108.111.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1">kernel-default-3.0.101-108.111.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-3.0.101-108.111.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1">kernel-default-base-3.0.101-108.111.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-3.0.101-108.111.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1">kernel-default-devel-3.0.101-108.111.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-man-3.0.101-108.111.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1">kernel-default-man-3.0.101-108.111.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-3.0.101-108.111.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1">kernel-ec2-3.0.101-108.111.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-base-3.0.101-108.111.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1">kernel-ec2-base-3.0.101-108.111.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-devel-3.0.101-108.111.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1">kernel-ec2-devel-3.0.101-108.111.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-3.0.101-108.111.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1">kernel-pae-3.0.101-108.111.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-base-3.0.101-108.111.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1">kernel-pae-base-3.0.101-108.111.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-devel-3.0.101-108.111.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1">kernel-pae-devel-3.0.101-108.111.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ppc64-3.0.101-108.111.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1">kernel-ppc64-3.0.101-108.111.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ppc64-base-3.0.101-108.111.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1">kernel-ppc64-base-3.0.101-108.111.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ppc64-devel-3.0.101-108.111.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1">kernel-ppc64-devel-3.0.101-108.111.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-3.0.101-108.111.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1">kernel-source-3.0.101-108.111.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-3.0.101-108.111.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1">kernel-syms-3.0.101-108.111.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-trace-3.0.101-108.111.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1">kernel-trace-3.0.101-108.111.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-trace-base-3.0.101-108.111.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1">kernel-trace-base-3.0.101-108.111.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-trace-devel-3.0.101-108.111.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1">kernel-trace-devel-3.0.101-108.111.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-3.0.101-108.111.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1">kernel-xen-3.0.101-108.111.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-base-3.0.101-108.111.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1">kernel-xen-base-3.0.101-108.111.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-devel-3.0.101-108.111.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1">kernel-xen-devel-3.0.101-108.111.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED ** An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a "double fetch" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used.</Note>
    </Notes>
    <CVE>CVE-2019-12456</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-12456.html</URL>
        <Description>CVE-2019-12456</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1136922</URL>
        <Description>SUSE Bug 1136922</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1136993</URL>
        <Description>SUSE Bug 1136993</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.</Note>
    </Notes>
    <CVE>CVE-2019-14896</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-14896.html</URL>
        <Description>CVE-2019-14896</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1157157</URL>
        <Description>SUSE Bug 1157157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160468</URL>
        <Description>SUSE Bug 1160468</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.</Note>
    </Notes>
    <CVE>CVE-2019-14897</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-14897.html</URL>
        <Description>CVE-2019-14897</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1157155</URL>
        <Description>SUSE Bug 1157155</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160467</URL>
        <Description>SUSE Bug 1160467</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160468</URL>
        <Description>SUSE Bug 1160468</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver.</Note>
    </Notes>
    <CVE>CVE-2019-15213</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-15213.html</URL>
        <Description>CVE-2019-15213</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146519</URL>
        <Description>SUSE Bug 1146519</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146544</URL>
        <Description>SUSE Bug 1146544</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158381</URL>
        <Description>SUSE Bug 1158381</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158834</URL>
        <Description>SUSE Bug 1158834</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel before 5.0.1. There is a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service.</Note>
    </Notes>
    <CVE>CVE-2019-15916</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-15916.html</URL>
        <Description>CVE-2019-15916</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149448</URL>
        <Description>SUSE Bug 1149448</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.</Note>
    </Notes>
    <CVE>CVE-2019-18660</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-18660.html</URL>
        <Description>CVE-2019-18660</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1157038</URL>
        <Description>SUSE Bug 1157038</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1157923</URL>
        <Description>SUSE Bug 1157923</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Linux kernel through 5.3.13 has a start_offset+size Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allows local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation.</Note>
    </Notes>
    <CVE>CVE-2019-18675</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-18675.html</URL>
        <Description>CVE-2019-18675</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1157804</URL>
        <Description>SUSE Bug 1157804</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.</Note>
    </Notes>
    <CVE>CVE-2019-19066</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19066.html</URL>
        <Description>CVE-2019-19066</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1157303</URL>
        <Description>SUSE Bug 1157303</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.</Note>
    </Notes>
    <CVE>CVE-2019-19073</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19073.html</URL>
        <Description>CVE-2019-19073</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1157070</URL>
        <Description>SUSE Bug 1157070</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.</Note>
    </Notes>
    <CVE>CVE-2019-19074</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19074.html</URL>
        <Description>CVE-2019-19074</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1157143</URL>
        <Description>SUSE Bug 1157143</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.</Note>
    </Notes>
    <CVE>CVE-2019-19227</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19227.html</URL>
        <Description>CVE-2019-19227</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1157678</URL>
        <Description>SUSE Bug 1157678</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.</Note>
    </Notes>
    <CVE>CVE-2019-19523</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19523.html</URL>
        <Description>CVE-2019-19523</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158381</URL>
        <Description>SUSE Bug 1158381</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158823</URL>
        <Description>SUSE Bug 1158823</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158834</URL>
        <Description>SUSE Bug 1158834</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.</Note>
    </Notes>
    <CVE>CVE-2019-19524</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19524.html</URL>
        <Description>CVE-2019-19524</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158381</URL>
        <Description>SUSE Bug 1158381</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158413</URL>
        <Description>SUSE Bug 1158413</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158834</URL>
        <Description>SUSE Bug 1158834</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.</Note>
    </Notes>
    <CVE>CVE-2019-19527</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19527.html</URL>
        <Description>CVE-2019-19527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158381</URL>
        <Description>SUSE Bug 1158381</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158834</URL>
        <Description>SUSE Bug 1158834</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158900</URL>
        <Description>SUSE Bug 1158900</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.</Note>
    </Notes>
    <CVE>CVE-2019-19530</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19530.html</URL>
        <Description>CVE-2019-19530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158381</URL>
        <Description>SUSE Bug 1158381</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158410</URL>
        <Description>SUSE Bug 1158410</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158834</URL>
        <Description>SUSE Bug 1158834</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca.</Note>
    </Notes>
    <CVE>CVE-2019-19531</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19531.html</URL>
        <Description>CVE-2019-19531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158381</URL>
        <Description>SUSE Bug 1158381</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158427</URL>
        <Description>SUSE Bug 1158427</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158445</URL>
        <Description>SUSE Bug 1158445</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158834</URL>
        <Description>SUSE Bug 1158834</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.</Note>
    </Notes>
    <CVE>CVE-2019-19532</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19532.html</URL>
        <Description>CVE-2019-19532</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158381</URL>
        <Description>SUSE Bug 1158381</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158823</URL>
        <Description>SUSE Bug 1158823</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158824</URL>
        <Description>SUSE Bug 1158824</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158834</URL>
        <Description>SUSE Bug 1158834</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.</Note>
    </Notes>
    <CVE>CVE-2019-19537</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19537.html</URL>
        <Description>CVE-2019-19537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158381</URL>
        <Description>SUSE Bug 1158381</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158834</URL>
        <Description>SUSE Bug 1158834</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158904</URL>
        <Description>SUSE Bug 1158904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer).</Note>
    </Notes>
    <CVE>CVE-2019-19768</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19768.html</URL>
        <Description>CVE-2019-19768</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159285</URL>
        <Description>SUSE Bug 1159285</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.</Note>
    </Notes>
    <CVE>CVE-2019-19965</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19965.html</URL>
        <Description>CVE-2019-19965</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159911</URL>
        <Description>SUSE Bug 1159911</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.</Note>
    </Notes>
    <CVE>CVE-2019-19966</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19966.html</URL>
        <Description>CVE-2019-19966</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159841</URL>
        <Description>SUSE Bug 1159841</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.</Note>
    </Notes>
    <CVE>CVE-2019-20096</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-20096.html</URL>
        <Description>CVE-2019-20096</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159908</URL>
        <Description>SUSE Bug 1159908</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.</Note>
    </Notes>
    <CVE>CVE-2020-10942</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10942.html</URL>
        <Description>CVE-2020-10942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1167629</URL>
        <Description>SUSE Bug 1167629</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.</Note>
    </Notes>
    <CVE>CVE-2020-11608</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-11608.html</URL>
        <Description>CVE-2020-11608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1168829</URL>
        <Description>SUSE Bug 1168829</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.</Note>
    </Notes>
    <CVE>CVE-2020-8647</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-8647.html</URL>
        <Description>CVE-2020-8647</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162929</URL>
        <Description>SUSE Bug 1162929</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1164078</URL>
        <Description>SUSE Bug 1164078</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.</Note>
    </Notes>
    <CVE>CVE-2020-8648</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-8648.html</URL>
        <Description>CVE-2020-8648</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162928</URL>
        <Description>SUSE Bug 1162928</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.</Note>
    </Notes>
    <CVE>CVE-2020-8649</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-8649.html</URL>
        <Description>CVE-2020-8649</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162929</URL>
        <Description>SUSE Bug 1162929</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162931</URL>
        <Description>SUSE Bug 1162931</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel 3.16 through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.</Note>
    </Notes>
    <CVE>CVE-2020-9383</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-9383.html</URL>
        <Description>CVE-2020-9383</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165111</URL>
        <Description>SUSE Bug 1165111</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
