<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:2392-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-10-27T18:35:05Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-10-27T18:35:05Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-10-27T18:35:05Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">

The openSUSE Leap 15.0 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-17666: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c lacked a certain upper-bound check, leading to a buffer overflow (bnc#1154372).
- CVE-2019-16232: drivers/net/wireless/marvell/libertas/if_sdio.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150465).
- CVE-2019-16234: drivers/net/wireless/intel/iwlwifi/pcie/trans.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150452).
- CVE-2019-17133: cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c did not reject a long SSID IE, leading to a Buffer Overflow (bnc#1153158).
- CVE-2019-17056: llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module did not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176 (bnc#1152788).

The following non-security bugs were fixed:

- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).
- ACPI / CPPC: do not require the _PSD method (bsc#1051510).
- ACPI: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).
- ACPI / processor: do not print errors for processorIDs == 0xff (bsc#1051510).
- act_mirred: Fix mirred_init_module error handling (bsc#1051510).
- Add kernel module compression support (bsc#1135854)
  For enabling the kernel module compress, add the item COMPRESS_MODULES='xz' in config.sh, then mkspec will pass it to the spec file.
- ALSA: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).
- ALSA: hda: Add support of Zhaoxin controller (bsc#1051510).
- ALSA: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).
- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).
- ALSA: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).
- ALSA: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).
- ALSA: hda: Flush interrupts on disabling (bsc#1051510).
- ALSA: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).
- ALSA: hda - Inform too slow responses (bsc#1051510).
- ALSA: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).
- ALSA: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).
- ALSA: hda/realtek - Fix alienware headset mic (bsc#1051510).
- ALSA: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).
- ALSA: hda: Set fifo_size for both playback and capture streams (bsc#1051510).
- ALSA: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).
- ALSA: hda/sigmatel - remove unused variable 'stac9200_core_init' (bsc#1051510).
- ALSA: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).
- ALSA: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).
- ALSA: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).
- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).
- ALSA: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).
- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- ASoC: Define a set of DAPM pre/post-up events (bsc#1051510).
- ASoC: dmaengine: Make the pcm-&gt;name equal to pcm-&gt;id if the name is not set (bsc#1051510).
- ASoC: Intel: Fix use of potentially uninitialized variable (bsc#1051510).
- ASoC: Intel: NHLT: Fix debug print format (bsc#1051510).
- ASoC: sgtl5000: Fix charge pump source assignment (bsc#1051510).
- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).
- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- blacklist 'signal: Correct namespace fixups of si_pid and si_uid' (bsc#1142667)
- blk-wbt: abstract out end IO completion handler (bsc#1135873).
- blk-wbt: fix has-sleeper queueing check (bsc#1135873).
- blk-wbt: improve waking of tasks (bsc#1135873).
- blk-wbt: move disable check into get_limit() (bsc#1135873).
- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).
- block: add io timeout to sysfs (bsc#1148410).
- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).
- bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).
- bnx2x: Fix VF's VLAN reconfiguration in reload (bsc#1086323 ).
- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).
- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).
- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).
- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).
- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).
- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).
- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).
- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).
- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).
- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).
- ceph: fix directories inode i_blkbits initialization (bsc#1153717).
- ceph: reconnect connection if session hang in opening state (bsc#1153718).
- ceph: update the mtime when truncating up (bsc#1153719).
- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).
- cfg80211: Purge frame registrations on iftype change (bsc#1051510).
- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).
- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).
- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).
- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).
- crypto: talitos - fix missing break in switch statement (bsc#1142635).
- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).
- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).
- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).
- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).
- dasd_fba: Display '00000000' for zero page when dumping sense
- /dev/mem: Bail out upon SIGKILL (git-fixes).
- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).
- drm/amdgpu/si: fix ASIC tests (git-fixes).
- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).
- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).
- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).
- drm: Flush output polling on shutdown (bsc#1051510).
- drm/msm/dsi: Implement reset correctly (bsc#1051510).
- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).
- drm/radeon: Fix EEH during kexec (bsc#1051510).
- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).
- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).
- e1000e: add workaround for possible stalled packet (bsc#1051510).
- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).
- Fix AMD IOMMU kABI (bsc#1154610).
- Fix KVM kABI after x86 mmu backports (bsc#1117665).
- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).
- HID: apple: Fix stuck function keys when using FN (bsc#1051510).
- HID: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).
- HID: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).
- HID: prodikeys: Fix general protection fault during probe (bsc#1051510).
- HID: sony: Fix memory corruption issue on cleanup (bsc#1051510).
- hwmon: (acpi_power_meter) Change log level for 'unsafe software power cap' (bsc#1051510).
- hwrng: core - do not wait on add_early_randomness() (git-fixes).
- i2c: riic: Clear NACK in tend isr (bsc#1051510).
- IB/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)
- IB/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).
- IB/mlx5: Consolidate use_umr checks into single function (bsc#1093205).
- IB/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).
- IB/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).
- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).
- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- iio: adc: ad799x: fix probe error handling (bsc#1051510).
- iio: light: opt3001: fix mutex unlock race (bsc#1051510).
- ima: always return negative code for error (bsc#1051510).
- Input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).
- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).
- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).
- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).
- iommu/amd: Remove domain-&gt;updated (bsc#1154610).
- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).
- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()' (networking-stable-19_09_15).
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).
- ixgbe: sync the first fragment unconditionally (bsc#1133140).
- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- kabi/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can't be expected of OOT code.
- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).
- kernel-binary: Drop .kernel-binary.spec.buildenv (boo#1154578).
- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).
- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354). It is not strictly necessary to uncompress it so maybe the ghost file can be 0 size in this case.
- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).
- kvm: Convert kvm_lock to a mutex (bsc#1117665).
- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).
- kvm: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).
- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).
- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).
- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).
- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).
- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).
- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).
- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).
- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).
- mac80211: accept deauth frames in IBSS mode (bsc#1051510).
- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).
- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).
- media: cpia2_usb: fix memory leaks (bsc#1051510).
- media: dvb-core: fix a memory leak bug (bsc#1051510).
- media: exynos4-is: fix leaked of_node references (bsc#1051510).
- media: gspca: zero usb_buf on error (bsc#1051510).
- media: hdpvr: Add device num check and handling (bsc#1051510).
- media: hdpvr: add terminating 0 at end of string (bsc#1051510).
- media: i2c: ov5645: Fix power sequence (bsc#1051510).
- media: iguanair: add sanity checks (bsc#1051510).
- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).
- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).
- media: ov9650: add a sanity check (bsc#1051510).
- media: radio/si470x: kill urb on error (bsc#1051510).
- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).
- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).
- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).
- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).
- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).
- memstick: jmb38x_ms: Fix an error handling path in 'jmb38x_ms_probe()' (bsc#1051510).
- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).
- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).
- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).
- mmc: sdhci: improve ADMA error reporting (bsc#1051510).
- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).
- net: Fix null de-reference of device refcount (networking-stable-19_09_15).
- net: fix skb use after free in netpoll (networking-stable-19_09_05).
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).
- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).
- net/mlx4_en: fix a memory leak bug (bsc#1046299).
- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).
- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).
- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).
- nfc: fix attrs checks in netlink interface (bsc#1051510).
- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).
- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).
- objtool: Clobber user CFLAGS variable (bsc#1153236).
- PCI: Correct pci=resource_alignment parameter example (bsc#1051510).
- PCI: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).
- PCI: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).
- PCI: PM: Fix pci_power_up() (bsc#1051510).
- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).
- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).
- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).
- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).
- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).
- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).
- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).
- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).
- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).
- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).
- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).
- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).
- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).
- powerpc/pseries: Remove confusing warning message (bsc#1109158).
- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).
- power: supply: sysfs: ratelimit property read error message (bsc#1051510).
- Pull packaging cleanup from mkubecek.
- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).
- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).
- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).
- qed: iWARP - Use READ_ONCE and smp_store_release to access ep-&gt;state (bsc#1050536 bsc#1050545).
- RDMA/bnxt_re: Fix spelling mistake 'missin_resp' -&gt; 'missing_resp' (bsc#1050244).
- RDMA: Fix goto target to release the allocated memory (bsc#1050244).
- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).
- scripts/arch-symbols: add missing link.
- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).
- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).
- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).
- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).
- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).
- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()' (networking-stable-19_09_15).
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).
- Sign non-x86 kernels when possible (boo#1134303)
- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).
- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).
- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).
- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).
- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).
- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).
- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).
- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).
- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).
- tracing: Initialize iter-&gt;seq after zeroing in tracing_read_pipe() (bsc#1151508).
- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).
- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).
- Update patches.suse/NFSv4-Check-the-return-value-of-update_open_stateid.patch (boo#1154189 bsc#1154747).
- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).
- usb: adutux: fix use-after-free on disconnect (bsc#1142635).
- usb: adutux: fix use-after-free on release (bsc#1051510).
- usb: chaoskey: fix use-after-free on release (bsc#1051510).
- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).
- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).
- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).
- usb: iowarrior: fix use-after-free on release (bsc#1051510).
- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).
- usb: legousbtower: fix open after failed reset request (bsc#1142635).
- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).
- usb: legousbtower: fix slab info leak at probe (bsc#1142635).
- usb: legousbtower: fix use-after-free on release (bsc#1051510).
- usb: microtek: fix info-leak at probe (bsc#1142635).
- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).
- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).
- usb: serial: fix runtime PM after driver unbind (bsc#1051510).
- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).
- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).
- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).
- usb: serial: option: add Telit FN980 compositions (bsc#1051510).
- usb: usblcd: fix I/O after disconnect (bsc#1142635).
- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).
- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).
- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).
- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).
- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).
- usb: yurex: Do not retry on unexpected errors (bsc#1051510).
- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).
- vfio_pci: Restore original state on release (bsc#1051510).
- vhost_net: conditionally enable tx polling (bsc#1145099).
- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).
- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).
- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).
- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).
- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).
- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).
- xhci: Check all endpoints for LPM timeout (bsc#1051510).
- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).
- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).
- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2019-2392</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER/#Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER</URL>
      <Description>E-Mail link for openSUSE-SU-2019:2392-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1046299</URL>
      <Description>SUSE Bug 1046299</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1046303</URL>
      <Description>SUSE Bug 1046303</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1046305</URL>
      <Description>SUSE Bug 1046305</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1050244</URL>
      <Description>SUSE Bug 1050244</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1050536</URL>
      <Description>SUSE Bug 1050536</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1050545</URL>
      <Description>SUSE Bug 1050545</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1051510</URL>
      <Description>SUSE Bug 1051510</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1055186</URL>
      <Description>SUSE Bug 1055186</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1061840</URL>
      <Description>SUSE Bug 1061840</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1064802</URL>
      <Description>SUSE Bug 1064802</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1065600</URL>
      <Description>SUSE Bug 1065600</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1066129</URL>
      <Description>SUSE Bug 1066129</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1073513</URL>
      <Description>SUSE Bug 1073513</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1086323</URL>
      <Description>SUSE Bug 1086323</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1087092</URL>
      <Description>SUSE Bug 1087092</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1089644</URL>
      <Description>SUSE Bug 1089644</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1093205</URL>
      <Description>SUSE Bug 1093205</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1097583</URL>
      <Description>SUSE Bug 1097583</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1097584</URL>
      <Description>SUSE Bug 1097584</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1097585</URL>
      <Description>SUSE Bug 1097585</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1097586</URL>
      <Description>SUSE Bug 1097586</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1097587</URL>
      <Description>SUSE Bug 1097587</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1097588</URL>
      <Description>SUSE Bug 1097588</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1098291</URL>
      <Description>SUSE Bug 1098291</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1101674</URL>
      <Description>SUSE Bug 1101674</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1109158</URL>
      <Description>SUSE Bug 1109158</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1114279</URL>
      <Description>SUSE Bug 1114279</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1117665</URL>
      <Description>SUSE Bug 1117665</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1123080</URL>
      <Description>SUSE Bug 1123080</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1133140</URL>
      <Description>SUSE Bug 1133140</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1134303</URL>
      <Description>SUSE Bug 1134303</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1135642</URL>
      <Description>SUSE Bug 1135642</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1135854</URL>
      <Description>SUSE Bug 1135854</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1135873</URL>
      <Description>SUSE Bug 1135873</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1137799</URL>
      <Description>SUSE Bug 1137799</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1140729</URL>
      <Description>SUSE Bug 1140729</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1140845</URL>
      <Description>SUSE Bug 1140845</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1140883</URL>
      <Description>SUSE Bug 1140883</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1141600</URL>
      <Description>SUSE Bug 1141600</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1142635</URL>
      <Description>SUSE Bug 1142635</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1142667</URL>
      <Description>SUSE Bug 1142667</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1144375</URL>
      <Description>SUSE Bug 1144375</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1144449</URL>
      <Description>SUSE Bug 1144449</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1145099</URL>
      <Description>SUSE Bug 1145099</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1148410</URL>
      <Description>SUSE Bug 1148410</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1150452</URL>
      <Description>SUSE Bug 1150452</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1150465</URL>
      <Description>SUSE Bug 1150465</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1150875</URL>
      <Description>SUSE Bug 1150875</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1151508</URL>
      <Description>SUSE Bug 1151508</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1152788</URL>
      <Description>SUSE Bug 1152788</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1152791</URL>
      <Description>SUSE Bug 1152791</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1153112</URL>
      <Description>SUSE Bug 1153112</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1153158</URL>
      <Description>SUSE Bug 1153158</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1153236</URL>
      <Description>SUSE Bug 1153236</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1153263</URL>
      <Description>SUSE Bug 1153263</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1153646</URL>
      <Description>SUSE Bug 1153646</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1153713</URL>
      <Description>SUSE Bug 1153713</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1153717</URL>
      <Description>SUSE Bug 1153717</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1153718</URL>
      <Description>SUSE Bug 1153718</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1153719</URL>
      <Description>SUSE Bug 1153719</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1153811</URL>
      <Description>SUSE Bug 1153811</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1154108</URL>
      <Description>SUSE Bug 1154108</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1154189</URL>
      <Description>SUSE Bug 1154189</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1154354</URL>
      <Description>SUSE Bug 1154354</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1154372</URL>
      <Description>SUSE Bug 1154372</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1154578</URL>
      <Description>SUSE Bug 1154578</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1154607</URL>
      <Description>SUSE Bug 1154607</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1154608</URL>
      <Description>SUSE Bug 1154608</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1154610</URL>
      <Description>SUSE Bug 1154610</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1154611</URL>
      <Description>SUSE Bug 1154611</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1154651</URL>
      <Description>SUSE Bug 1154651</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1154747</URL>
      <Description>SUSE Bug 1154747</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/118461_FIXME</URL>
      <Description>SUSE Bug 118461_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/133135_FIXME</URL>
      <Description>SUSE Bug 133135_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/135757_FIXME</URL>
      <Description>SUSE Bug 135757_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/147830_FIXME</URL>
      <Description>SUSE Bug 147830_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/147831_FIXME</URL>
      <Description>SUSE Bug 147831_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/158172_FIXME</URL>
      <Description>SUSE Bug 158172_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/165544_FIXME</URL>
      <Description>SUSE Bug 165544_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/166495_FIXME</URL>
      <Description>SUSE Bug 166495_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/172859_FIXME</URL>
      <Description>SUSE Bug 172859_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/172860_FIXME</URL>
      <Description>SUSE Bug 172860_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/181778_FIXME</URL>
      <Description>SUSE Bug 181778_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/229268_FIXME</URL>
      <Description>SUSE Bug 229268_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/229269_FIXME</URL>
      <Description>SUSE Bug 229269_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/229270_FIXME</URL>
      <Description>SUSE Bug 229270_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/229274_FIXME</URL>
      <Description>SUSE Bug 229274_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/229277_FIXME</URL>
      <Description>SUSE Bug 229277_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/229279_FIXME</URL>
      <Description>SUSE Bug 229279_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/229280_FIXME</URL>
      <Description>SUSE Bug 229280_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/229281_FIXME</URL>
      <Description>SUSE Bug 229281_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/229283_FIXME</URL>
      <Description>SUSE Bug 229283_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/229285_FIXME</URL>
      <Description>SUSE Bug 229285_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/229286_FIXME</URL>
      <Description>SUSE Bug 229286_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/229297_FIXME</URL>
      <Description>SUSE Bug 229297_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/296718_FIXME</URL>
      <Description>SUSE Bug 296718_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/358767_FIXME</URL>
      <Description>SUSE Bug 358767_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/359798_FIXME</URL>
      <Description>SUSE Bug 359798_FIXME</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/802154</URL>
      <Description>SUSE Bug 802154</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/814594</URL>
      <Description>SUSE Bug 814594</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/919448</URL>
      <Description>SUSE Bug 919448</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/987367</URL>
      <Description>SUSE Bug 987367</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/998153</URL>
      <Description>SUSE Bug 998153</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-16232/</URL>
      <Description>SUSE CVE CVE-2019-16232 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-16234/</URL>
      <Description>SUSE CVE CVE-2019-16234 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-17056/</URL>
      <Description>SUSE CVE CVE-2019-17056 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-17133/</URL>
      <Description>SUSE CVE CVE-2019-17133 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-17666/</URL>
      <Description>SUSE CVE CVE-2019-17666 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0" CPE="cpe:/o:opensuse:leap:15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-4.12.14-lp150.12.79.1">
      <FullProductName ProductID="kernel-debug-4.12.14-lp150.12.79.1">kernel-debug-4.12.14-lp150.12.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-base-4.12.14-lp150.12.79.1">
      <FullProductName ProductID="kernel-debug-base-4.12.14-lp150.12.79.1">kernel-debug-base-4.12.14-lp150.12.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-devel-4.12.14-lp150.12.79.1">
      <FullProductName ProductID="kernel-debug-devel-4.12.14-lp150.12.79.1">kernel-debug-devel-4.12.14-lp150.12.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-4.12.14-lp150.12.79.1">
      <FullProductName ProductID="kernel-default-4.12.14-lp150.12.79.1">kernel-default-4.12.14-lp150.12.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-4.12.14-lp150.12.79.1">
      <FullProductName ProductID="kernel-default-base-4.12.14-lp150.12.79.1">kernel-default-base-4.12.14-lp150.12.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-4.12.14-lp150.12.79.1">
      <FullProductName ProductID="kernel-default-devel-4.12.14-lp150.12.79.1">kernel-default-devel-4.12.14-lp150.12.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-4.12.14-lp150.12.79.1">
      <FullProductName ProductID="kernel-devel-4.12.14-lp150.12.79.1">kernel-devel-4.12.14-lp150.12.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-4.12.14-lp150.12.79.1">
      <FullProductName ProductID="kernel-docs-4.12.14-lp150.12.79.1">kernel-docs-4.12.14-lp150.12.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-html-4.12.14-lp150.12.79.1">
      <FullProductName ProductID="kernel-docs-html-4.12.14-lp150.12.79.1">kernel-docs-html-4.12.14-lp150.12.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-4.12.14-lp150.12.79.1">
      <FullProductName ProductID="kernel-kvmsmall-4.12.14-lp150.12.79.1">kernel-kvmsmall-4.12.14-lp150.12.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-base-4.12.14-lp150.12.79.1">
      <FullProductName ProductID="kernel-kvmsmall-base-4.12.14-lp150.12.79.1">kernel-kvmsmall-base-4.12.14-lp150.12.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-devel-4.12.14-lp150.12.79.1">
      <FullProductName ProductID="kernel-kvmsmall-devel-4.12.14-lp150.12.79.1">kernel-kvmsmall-devel-4.12.14-lp150.12.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-macros-4.12.14-lp150.12.79.1">
      <FullProductName ProductID="kernel-macros-4.12.14-lp150.12.79.1">kernel-macros-4.12.14-lp150.12.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-build-4.12.14-lp150.12.79.1">
      <FullProductName ProductID="kernel-obs-build-4.12.14-lp150.12.79.1">kernel-obs-build-4.12.14-lp150.12.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-qa-4.12.14-lp150.12.79.1">
      <FullProductName ProductID="kernel-obs-qa-4.12.14-lp150.12.79.1">kernel-obs-qa-4.12.14-lp150.12.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-4.12.14-lp150.12.79.1">
      <FullProductName ProductID="kernel-source-4.12.14-lp150.12.79.1">kernel-source-4.12.14-lp150.12.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-vanilla-4.12.14-lp150.12.79.1">
      <FullProductName ProductID="kernel-source-vanilla-4.12.14-lp150.12.79.1">kernel-source-vanilla-4.12.14-lp150.12.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-4.12.14-lp150.12.79.1">
      <FullProductName ProductID="kernel-syms-4.12.14-lp150.12.79.1">kernel-syms-4.12.14-lp150.12.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-4.12.14-lp150.12.79.1">
      <FullProductName ProductID="kernel-vanilla-4.12.14-lp150.12.79.1">kernel-vanilla-4.12.14-lp150.12.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-base-4.12.14-lp150.12.79.1">
      <FullProductName ProductID="kernel-vanilla-base-4.12.14-lp150.12.79.1">kernel-vanilla-base-4.12.14-lp150.12.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-devel-4.12.14-lp150.12.79.1">
      <FullProductName ProductID="kernel-vanilla-devel-4.12.14-lp150.12.79.1">kernel-vanilla-devel-4.12.14-lp150.12.79.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-debug-4.12.14-lp150.12.79.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1">kernel-debug-4.12.14-lp150.12.79.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-debug-base-4.12.14-lp150.12.79.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1">kernel-debug-base-4.12.14-lp150.12.79.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-debug-devel-4.12.14-lp150.12.79.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1">kernel-debug-devel-4.12.14-lp150.12.79.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-lp150.12.79.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1">kernel-default-4.12.14-lp150.12.79.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-4.12.14-lp150.12.79.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1">kernel-default-base-4.12.14-lp150.12.79.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-4.12.14-lp150.12.79.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1">kernel-default-devel-4.12.14-lp150.12.79.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-4.12.14-lp150.12.79.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1">kernel-devel-4.12.14-lp150.12.79.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-4.12.14-lp150.12.79.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1">kernel-docs-4.12.14-lp150.12.79.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-html-4.12.14-lp150.12.79.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1">kernel-docs-html-4.12.14-lp150.12.79.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-kvmsmall-4.12.14-lp150.12.79.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1">kernel-kvmsmall-4.12.14-lp150.12.79.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-kvmsmall-base-4.12.14-lp150.12.79.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1">kernel-kvmsmall-base-4.12.14-lp150.12.79.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-kvmsmall-devel-4.12.14-lp150.12.79.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1">kernel-kvmsmall-devel-4.12.14-lp150.12.79.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-4.12.14-lp150.12.79.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1">kernel-macros-4.12.14-lp150.12.79.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-build-4.12.14-lp150.12.79.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1">kernel-obs-build-4.12.14-lp150.12.79.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-qa-4.12.14-lp150.12.79.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1">kernel-obs-qa-4.12.14-lp150.12.79.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-4.12.14-lp150.12.79.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1">kernel-source-4.12.14-lp150.12.79.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-vanilla-4.12.14-lp150.12.79.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1">kernel-source-vanilla-4.12.14-lp150.12.79.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-4.12.14-lp150.12.79.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1">kernel-syms-4.12.14-lp150.12.79.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-vanilla-4.12.14-lp150.12.79.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1">kernel-vanilla-4.12.14-lp150.12.79.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-vanilla-base-4.12.14-lp150.12.79.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1">kernel-vanilla-base-4.12.14-lp150.12.79.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-vanilla-devel-4.12.14-lp150.12.79.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1">kernel-vanilla-devel-4.12.14-lp150.12.79.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2019-16232</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER/#Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-16232.html</URL>
        <Description>CVE-2019-16232</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1150465</URL>
        <Description>SUSE Bug 1150465</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2019-16234</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER/#Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-16234.html</URL>
        <Description>CVE-2019-16234</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1150452</URL>
        <Description>SUSE Bug 1150452</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.</Note>
    </Notes>
    <CVE>CVE-2019-17056</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER/#Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-17056.html</URL>
        <Description>CVE-2019-17056</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1152788</URL>
        <Description>SUSE Bug 1152788</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.</Note>
    </Notes>
    <CVE>CVE-2019-17133</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER/#Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-17133.html</URL>
        <Description>CVE-2019-17133</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153158</URL>
        <Description>SUSE Bug 1153158</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153161</URL>
        <Description>SUSE Bug 1153161</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2019-17666</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>8.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER/#Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-17666.html</URL>
        <Description>CVE-2019-17666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154372</URL>
        <Description>SUSE Bug 1154372</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
