<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2023:0852-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-03-21T12:36:10Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-03-21T12:36:10Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-03-21T12:36:10Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-4129: Fixed a denial of service with the Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. (bsc#1205711)
- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bsc#1194535).
- CVE-2023-23559: Fixed integer overflow in rndis_wlan that leads to a buffer overflow (bsc#1207051).
- CVE-2023-26545: Fixed double free in net/mpls/af_mpls.c upon an allocation failure (bsc#1208700).
- CVE-2022-38096: Fixed NULL-ptr deref in vmw_cmd_dx_define_query() (bsc#1203331).
- CVE-2022-36280: Fixed out-of-bounds memory access vulnerability found in vmwgfx driver (bsc#1203332).
- CVE-2023-0045: Fixed missing Flush IBP in ib_prctl_set (bsc#1207773).
- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).
- CVE-2022-2991: Fixed an heap-based overflow in the lightnvm implemenation (bsc#1201420).

The following non-security bugs were fixed:

- kabi/severities: add l2tp local symbols
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2023-852,SUSE-OpenStack-Cloud-9-2023-852,SUSE-OpenStack-Cloud-Crowbar-9-2023-852,SUSE-SLE-HA-12-SP4-2023-852,SUSE-SLE-Live-Patching-12-SP4-2023-852,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-852,SUSE-SLE-SERVER-12-SP4-LTSS-2023-852</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20230852-1/</URL>
      <Description>Link for SUSE-SU-2023:0852-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2023-March/014114.html</URL>
      <Description>E-Mail link for SUSE-SU-2023:0852-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1191881</URL>
      <Description>SUSE Bug 1191881</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1194535</URL>
      <Description>SUSE Bug 1194535</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1201420</URL>
      <Description>SUSE Bug 1201420</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1203331</URL>
      <Description>SUSE Bug 1203331</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1203332</URL>
      <Description>SUSE Bug 1203332</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1205711</URL>
      <Description>SUSE Bug 1205711</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1207051</URL>
      <Description>SUSE Bug 1207051</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1207773</URL>
      <Description>SUSE Bug 1207773</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1207795</URL>
      <Description>SUSE Bug 1207795</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1208700</URL>
      <Description>SUSE Bug 1208700</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1209188</URL>
      <Description>SUSE Bug 1209188</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-4203/</URL>
      <Description>SUSE CVE CVE-2021-4203 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2991/</URL>
      <Description>SUSE CVE CVE-2022-2991 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-36280/</URL>
      <Description>SUSE CVE CVE-2022-36280 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-38096/</URL>
      <Description>SUSE CVE CVE-2022-38096 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-4129/</URL>
      <Description>SUSE CVE CVE-2022-4129 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-0045/</URL>
      <Description>SUSE CVE CVE-2023-0045 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-0590/</URL>
      <Description>SUSE CVE CVE-2023-0590 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-23559/</URL>
      <Description>SUSE CVE CVE-2023-23559 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-26545/</URL>
      <Description>SUSE CVE CVE-2023-26545 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Availability Extension 12 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Availability Extension 12 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 12 SP4" CPE="cpe:/o:suse:sle-ha:12:sp4">SUSE Linux Enterprise High Availability Extension 12 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 12 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 12 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP4" CPE="cpe:/o:suse:sle-live-patching:12:sp4">SUSE Linux Enterprise Live Patching 12 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP4-ESPOS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP4-ESPOS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP4-ESPOS" CPE="cpe:/o:suse:sles-espos:12:sp4">SUSE Linux Enterprise Server 12 SP4-ESPOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP4-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP4-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP4-LTSS" CPE="cpe:/o:suse:sles-ltss:12:sp4">SUSE Linux Enterprise Server 12 SP4-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE OpenStack Cloud 9">
      <Branch Type="Product Name" Name="SUSE OpenStack Cloud 9">
        <FullProductName ProductID="SUSE OpenStack Cloud 9" CPE="cpe:/o:suse:suse-openstack-cloud:9">SUSE OpenStack Cloud 9</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE OpenStack Cloud Crowbar 9">
      <Branch Type="Product Name" Name="SUSE OpenStack Cloud Crowbar 9">
        <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 9" CPE="cpe:/o:suse:suse-openstack-cloud-crowbar:9">SUSE OpenStack Cloud Crowbar 9</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="cluster-md-kmp-default-4.12.14-95.120.4">
      <FullProductName ProductID="cluster-md-kmp-default-4.12.14-95.120.4">cluster-md-kmp-default-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dlm-kmp-default-4.12.14-95.120.4">
      <FullProductName ProductID="dlm-kmp-default-4.12.14-95.120.4">dlm-kmp-default-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gfs2-kmp-default-4.12.14-95.120.4">
      <FullProductName ProductID="gfs2-kmp-default-4.12.14-95.120.4">gfs2-kmp-default-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-debug-4.12.14-95.120.4">kernel-debug-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-base-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-debug-base-4.12.14-95.120.4">kernel-debug-base-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-devel-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-debug-devel-4.12.14-95.120.4">kernel-debug-devel-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-kgraft-devel-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-debug-kgraft-devel-4.12.14-95.120.4">kernel-debug-kgraft-devel-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-default-4.12.14-95.120.4">kernel-default-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-default-base-4.12.14-95.120.4">kernel-default-base-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-default-devel-4.12.14-95.120.4">kernel-default-devel-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-extra-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-default-extra-4.12.14-95.120.4">kernel-default-extra-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-kgraft-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-default-kgraft-4.12.14-95.120.4">kernel-default-kgraft-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-kgraft-devel-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-default-kgraft-devel-4.12.14-95.120.4">kernel-default-kgraft-devel-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-man-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-default-man-4.12.14-95.120.4">kernel-default-man-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-devel-4.12.14-95.120.4">kernel-devel-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-4.12.14-95.120.6">
      <FullProductName ProductID="kernel-docs-4.12.14-95.120.6">kernel-docs-4.12.14-95.120.6</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-html-4.12.14-95.120.6">
      <FullProductName ProductID="kernel-docs-html-4.12.14-95.120.6">kernel-docs-html-4.12.14-95.120.6</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-kvmsmall-4.12.14-95.120.4">kernel-kvmsmall-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-base-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-kvmsmall-base-4.12.14-95.120.4">kernel-kvmsmall-base-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-devel-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-kvmsmall-devel-4.12.14-95.120.4">kernel-kvmsmall-devel-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-kgraft-devel-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-kvmsmall-kgraft-devel-4.12.14-95.120.4">kernel-kvmsmall-kgraft-devel-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-macros-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-macros-4.12.14-95.120.4">kernel-macros-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-build-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-obs-build-4.12.14-95.120.4">kernel-obs-build-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-qa-4.12.14-95.120.1">
      <FullProductName ProductID="kernel-obs-qa-4.12.14-95.120.1">kernel-obs-qa-4.12.14-95.120.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-source-4.12.14-95.120.4">kernel-source-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-vanilla-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-source-vanilla-4.12.14-95.120.4">kernel-source-vanilla-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-syms-4.12.14-95.120.4">kernel-syms-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-vanilla-4.12.14-95.120.4">kernel-vanilla-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-base-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-vanilla-base-4.12.14-95.120.4">kernel-vanilla-base-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-devel-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-vanilla-devel-4.12.14-95.120.4">kernel-vanilla-devel-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-kgraft-devel-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-vanilla-kgraft-devel-4.12.14-95.120.4">kernel-vanilla-kgraft-devel-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-zfcpdump-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-zfcpdump-4.12.14-95.120.4">kernel-zfcpdump-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-zfcpdump-man-4.12.14-95.120.4">
      <FullProductName ProductID="kernel-zfcpdump-man-4.12.14-95.120.4">kernel-zfcpdump-man-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-4_12_14-95_120-default-1-6.3.4">
      <FullProductName ProductID="kgraft-patch-4_12_14-95_120-default-1-6.3.4">kgraft-patch-4_12_14-95_120-default-1-6.3.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kselftests-kmp-default-4.12.14-95.120.4">
      <FullProductName ProductID="kselftests-kmp-default-4.12.14-95.120.4">kselftests-kmp-default-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ocfs2-kmp-default-4.12.14-95.120.4">
      <FullProductName ProductID="ocfs2-kmp-default-4.12.14-95.120.4">ocfs2-kmp-default-4.12.14-95.120.4</FullProductName>
    </Branch>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Availability Extension 12 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.120.4">cluster-md-kmp-default-4.12.14-95.120.4 as a component of SUSE Linux Enterprise High Availability Extension 12 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Availability Extension 12 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.120.4">dlm-kmp-default-4.12.14-95.120.4 as a component of SUSE Linux Enterprise High Availability Extension 12 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Availability Extension 12 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.120.4">gfs2-kmp-default-4.12.14-95.120.4 as a component of SUSE Linux Enterprise High Availability Extension 12 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Availability Extension 12 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.120.4">ocfs2-kmp-default-4.12.14-95.120.4 as a component of SUSE Linux Enterprise High Availability Extension 12 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-kgraft-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.120.4">kernel-default-kgraft-4.12.14-95.120.4 as a component of SUSE Linux Enterprise Live Patching 12 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-kgraft-devel-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.120.4">kernel-default-kgraft-devel-4.12.14-95.120.4 as a component of SUSE Linux Enterprise Live Patching 12 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kgraft-patch-4_12_14-95_120-default-1-6.3.4" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-1-6.3.4">kgraft-patch-4_12_14-95_120-default-1-6.3.4 as a component of SUSE Linux Enterprise Live Patching 12 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP4-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.120.4">kernel-default-4.12.14-95.120.4 as a component of SUSE Linux Enterprise Server 12 SP4-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP4-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.120.4">kernel-default-base-4.12.14-95.120.4 as a component of SUSE Linux Enterprise Server 12 SP4-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP4-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.120.4">kernel-default-devel-4.12.14-95.120.4 as a component of SUSE Linux Enterprise Server 12 SP4-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP4-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.120.4">kernel-devel-4.12.14-95.120.4 as a component of SUSE Linux Enterprise Server 12 SP4-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP4-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.120.4">kernel-macros-4.12.14-95.120.4 as a component of SUSE Linux Enterprise Server 12 SP4-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP4-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.120.4">kernel-source-4.12.14-95.120.4 as a component of SUSE Linux Enterprise Server 12 SP4-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP4-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.120.4">kernel-syms-4.12.14-95.120.4 as a component of SUSE Linux Enterprise Server 12 SP4-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.120.4">kernel-default-4.12.14-95.120.4 as a component of SUSE Linux Enterprise Server 12 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.120.4">kernel-default-base-4.12.14-95.120.4 as a component of SUSE Linux Enterprise Server 12 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.120.4">kernel-default-devel-4.12.14-95.120.4 as a component of SUSE Linux Enterprise Server 12 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-man-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.120.4">kernel-default-man-4.12.14-95.120.4 as a component of SUSE Linux Enterprise Server 12 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.120.4">kernel-devel-4.12.14-95.120.4 as a component of SUSE Linux Enterprise Server 12 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.120.4">kernel-macros-4.12.14-95.120.4 as a component of SUSE Linux Enterprise Server 12 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.120.4">kernel-source-4.12.14-95.120.4 as a component of SUSE Linux Enterprise Server 12 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.120.4">kernel-syms-4.12.14-95.120.4 as a component of SUSE Linux Enterprise Server 12 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 9">
      <FullProductName ProductID="SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.120.4">kernel-default-4.12.14-95.120.4 as a component of SUSE OpenStack Cloud 9</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 9">
      <FullProductName ProductID="SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.120.4">kernel-default-base-4.12.14-95.120.4 as a component of SUSE OpenStack Cloud 9</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 9">
      <FullProductName ProductID="SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.120.4">kernel-default-devel-4.12.14-95.120.4 as a component of SUSE OpenStack Cloud 9</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 9">
      <FullProductName ProductID="SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.120.4">kernel-devel-4.12.14-95.120.4 as a component of SUSE OpenStack Cloud 9</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 9">
      <FullProductName ProductID="SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.120.4">kernel-macros-4.12.14-95.120.4 as a component of SUSE OpenStack Cloud 9</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 9">
      <FullProductName ProductID="SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.120.4">kernel-source-4.12.14-95.120.4 as a component of SUSE OpenStack Cloud 9</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 9">
      <FullProductName ProductID="SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.120.4">kernel-syms-4.12.14-95.120.4 as a component of SUSE OpenStack Cloud 9</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud Crowbar 9">
      <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.120.4">kernel-default-4.12.14-95.120.4 as a component of SUSE OpenStack Cloud Crowbar 9</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud Crowbar 9">
      <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.120.4">kernel-default-base-4.12.14-95.120.4 as a component of SUSE OpenStack Cloud Crowbar 9</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud Crowbar 9">
      <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.120.4">kernel-default-devel-4.12.14-95.120.4 as a component of SUSE OpenStack Cloud Crowbar 9</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud Crowbar 9">
      <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.120.4">kernel-devel-4.12.14-95.120.4 as a component of SUSE OpenStack Cloud Crowbar 9</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud Crowbar 9">
      <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.120.4">kernel-macros-4.12.14-95.120.4 as a component of SUSE OpenStack Cloud Crowbar 9</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud Crowbar 9">
      <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.120.4">kernel-source-4.12.14-95.120.4 as a component of SUSE OpenStack Cloud Crowbar 9</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-4.12.14-95.120.4" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud Crowbar 9">
      <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.120.4">kernel-syms-4.12.14-95.120.4 as a component of SUSE OpenStack Cloud Crowbar 9</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.</Note>
    </Notes>
    <CVE>CVE-2021-4203</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-1-6.3.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.120.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20230852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-4203.html</URL>
        <Description>CVE-2021-4203</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194535</URL>
        <Description>SUSE Bug 1194535</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A heap-based buffer overflow was found in the Linux kernel's LightNVM subsystem. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. This vulnerability allows a local attacker to escalate privileges and execute arbitrary code in the context of the kernel. The attacker must first obtain the ability to execute high-privileged code on the target system to exploit this vulnerability.</Note>
    </Notes>
    <CVE>CVE-2022-2991</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-1-6.3.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.120.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20230852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2991.html</URL>
        <Description>CVE-2022-2991</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201420</URL>
        <Description>SUSE Bug 1201420</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203993</URL>
        <Description>SUSE Bug 1203993</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211495</URL>
        <Description>SUSE Bug 1211495</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out-of-bounds(OOB) memory access vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_kms.c in GPU component in the Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).</Note>
    </Notes>
    <CVE>CVE-2022-36280</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-1-6.3.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.120.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20230852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-36280.html</URL>
        <Description>CVE-2022-36280</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203332</URL>
        <Description>SUSE Bug 1203332</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A NULL pointer dereference vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).</Note>
    </Notes>
    <CVE>CVE-2022-38096</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-1-6.3.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.120.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20230852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-38096.html</URL>
        <Description>CVE-2022-38096</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203331</URL>
        <Description>SUSE Bug 1203331</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.</Note>
    </Notes>
    <CVE>CVE-2022-4129</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-1-6.3.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.120.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20230852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-4129.html</URL>
        <Description>CVE-2022-4129</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205711</URL>
        <Description>SUSE Bug 1205711</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set  function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall.  The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176.

We recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96

</Note>
    </Notes>
    <CVE>CVE-2023-0045</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-1-6.3.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.120.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20230852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-0045.html</URL>
        <Description>CVE-2023-0045</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1207773</URL>
        <Description>SUSE Bug 1207773</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 ("net: sched: fix race condition in qdisc_graft()") not applied yet, then kernel could be affected.</Note>
    </Notes>
    <CVE>CVE-2023-0590</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-1-6.3.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.120.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20230852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-0590.html</URL>
        <Description>CVE-2023-0590</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1207795</URL>
        <Description>SUSE Bug 1207795</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1207822</URL>
        <Description>SUSE Bug 1207822</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211495</URL>
        <Description>SUSE Bug 1211495</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211833</URL>
        <Description>SUSE Bug 1211833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.</Note>
    </Notes>
    <CVE>CVE-2023-23559</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-1-6.3.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.120.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20230852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-23559.html</URL>
        <Description>CVE-2023-23559</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1207051</URL>
        <Description>SUSE Bug 1207051</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device.</Note>
    </Notes>
    <CVE>CVE-2023-26545</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-1-6.3.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.120.4</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.120.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20230852-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-26545.html</URL>
        <Description>CVE-2023-26545</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208700</URL>
        <Description>SUSE Bug 1208700</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208909</URL>
        <Description>SUSE Bug 1208909</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1210423</URL>
        <Description>SUSE Bug 1210423</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
