<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for RT kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2021:0242-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-02-05T15:16:03Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-02-05T15:16:03Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-02-05T15:16:03Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for RT kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update syncs the RT kernel from the SUSE Linux Enterprise 15-SP2 codestream.
  
This update was imported from the SUSE:SLE-15-SP2:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2021-242</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      <Description>E-Mail link for openSUSE-SU-2021:0242-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1034995</URL>
      <Description>SUSE Bug 1034995</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1040855</URL>
      <Description>SUSE Bug 1040855</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1043347</URL>
      <Description>SUSE Bug 1043347</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1044120</URL>
      <Description>SUSE Bug 1044120</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1044767</URL>
      <Description>SUSE Bug 1044767</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1055014</URL>
      <Description>SUSE Bug 1055014</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1055117</URL>
      <Description>SUSE Bug 1055117</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1055186</URL>
      <Description>SUSE Bug 1055186</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1058115</URL>
      <Description>SUSE Bug 1058115</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1061843</URL>
      <Description>SUSE Bug 1061843</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1065600</URL>
      <Description>SUSE Bug 1065600</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1065729</URL>
      <Description>SUSE Bug 1065729</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1066382</URL>
      <Description>SUSE Bug 1066382</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1071995</URL>
      <Description>SUSE Bug 1071995</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1077428</URL>
      <Description>SUSE Bug 1077428</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1085030</URL>
      <Description>SUSE Bug 1085030</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1094244</URL>
      <Description>SUSE Bug 1094244</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1094840</URL>
      <Description>SUSE Bug 1094840</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1109695</URL>
      <Description>SUSE Bug 1109695</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1115431</URL>
      <Description>SUSE Bug 1115431</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1120163</URL>
      <Description>SUSE Bug 1120163</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1129923</URL>
      <Description>SUSE Bug 1129923</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1133021</URL>
      <Description>SUSE Bug 1133021</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1134760</URL>
      <Description>SUSE Bug 1134760</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1136666</URL>
      <Description>SUSE Bug 1136666</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1138374</URL>
      <Description>SUSE Bug 1138374</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1139944</URL>
      <Description>SUSE Bug 1139944</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1148868</URL>
      <Description>SUSE Bug 1148868</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1149032</URL>
      <Description>SUSE Bug 1149032</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1152148</URL>
      <Description>SUSE Bug 1152148</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1152457</URL>
      <Description>SUSE Bug 1152457</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1152472</URL>
      <Description>SUSE Bug 1152472</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1152489</URL>
      <Description>SUSE Bug 1152489</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1153274</URL>
      <Description>SUSE Bug 1153274</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1154353</URL>
      <Description>SUSE Bug 1154353</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1154488</URL>
      <Description>SUSE Bug 1154488</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1154492</URL>
      <Description>SUSE Bug 1154492</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1154824</URL>
      <Description>SUSE Bug 1154824</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1155518</URL>
      <Description>SUSE Bug 1155518</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1155798</URL>
      <Description>SUSE Bug 1155798</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1156315</URL>
      <Description>SUSE Bug 1156315</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1156395</URL>
      <Description>SUSE Bug 1156395</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1157169</URL>
      <Description>SUSE Bug 1157169</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158050</URL>
      <Description>SUSE Bug 1158050</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158242</URL>
      <Description>SUSE Bug 1158242</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158265</URL>
      <Description>SUSE Bug 1158265</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158748</URL>
      <Description>SUSE Bug 1158748</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158765</URL>
      <Description>SUSE Bug 1158765</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158775</URL>
      <Description>SUSE Bug 1158775</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158983</URL>
      <Description>SUSE Bug 1158983</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1159058</URL>
      <Description>SUSE Bug 1159058</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1159781</URL>
      <Description>SUSE Bug 1159781</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1159867</URL>
      <Description>SUSE Bug 1159867</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1159886</URL>
      <Description>SUSE Bug 1159886</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1160388</URL>
      <Description>SUSE Bug 1160388</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1160634</URL>
      <Description>SUSE Bug 1160634</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1160947</URL>
      <Description>SUSE Bug 1160947</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1161099</URL>
      <Description>SUSE Bug 1161099</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1161495</URL>
      <Description>SUSE Bug 1161495</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1162002</URL>
      <Description>SUSE Bug 1162002</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1162063</URL>
      <Description>SUSE Bug 1162063</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1162209</URL>
      <Description>SUSE Bug 1162209</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1162400</URL>
      <Description>SUSE Bug 1162400</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1162702</URL>
      <Description>SUSE Bug 1162702</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1163592</URL>
      <Description>SUSE Bug 1163592</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1163727</URL>
      <Description>SUSE Bug 1163727</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1164648</URL>
      <Description>SUSE Bug 1164648</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1164777</URL>
      <Description>SUSE Bug 1164777</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1164780</URL>
      <Description>SUSE Bug 1164780</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1165211</URL>
      <Description>SUSE Bug 1165211</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1165455</URL>
      <Description>SUSE Bug 1165455</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1165629</URL>
      <Description>SUSE Bug 1165629</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1165692</URL>
      <Description>SUSE Bug 1165692</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1165933</URL>
      <Description>SUSE Bug 1165933</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1165975</URL>
      <Description>SUSE Bug 1165975</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1166146</URL>
      <Description>SUSE Bug 1166146</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1166166</URL>
      <Description>SUSE Bug 1166166</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1166340</URL>
      <Description>SUSE Bug 1166340</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1166965</URL>
      <Description>SUSE Bug 1166965</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1166985</URL>
      <Description>SUSE Bug 1166985</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1167030</URL>
      <Description>SUSE Bug 1167030</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1167104</URL>
      <Description>SUSE Bug 1167104</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1167527</URL>
      <Description>SUSE Bug 1167527</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1167651</URL>
      <Description>SUSE Bug 1167651</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1167657</URL>
      <Description>SUSE Bug 1167657</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1167773</URL>
      <Description>SUSE Bug 1167773</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1167851</URL>
      <Description>SUSE Bug 1167851</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1168230</URL>
      <Description>SUSE Bug 1168230</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1168461</URL>
      <Description>SUSE Bug 1168461</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1168468</URL>
      <Description>SUSE Bug 1168468</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1168779</URL>
      <Description>SUSE Bug 1168779</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1168838</URL>
      <Description>SUSE Bug 1168838</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1168952</URL>
      <Description>SUSE Bug 1168952</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1168959</URL>
      <Description>SUSE Bug 1168959</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1169021</URL>
      <Description>SUSE Bug 1169021</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1169094</URL>
      <Description>SUSE Bug 1169094</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1169194</URL>
      <Description>SUSE Bug 1169194</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1169263</URL>
      <Description>SUSE Bug 1169263</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1169514</URL>
      <Description>SUSE Bug 1169514</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1169681</URL>
      <Description>SUSE Bug 1169681</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1169763</URL>
      <Description>SUSE Bug 1169763</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1169771</URL>
      <Description>SUSE Bug 1169771</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1169790</URL>
      <Description>SUSE Bug 1169790</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1169795</URL>
      <Description>SUSE Bug 1169795</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1170011</URL>
      <Description>SUSE Bug 1170011</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1170139</URL>
      <Description>SUSE Bug 1170139</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1170232</URL>
      <Description>SUSE Bug 1170232</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1170284</URL>
      <Description>SUSE Bug 1170284</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1170415</URL>
      <Description>SUSE Bug 1170415</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1170442</URL>
      <Description>SUSE Bug 1170442</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1170617</URL>
      <Description>SUSE Bug 1170617</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1170621</URL>
      <Description>SUSE Bug 1170621</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1170774</URL>
      <Description>SUSE Bug 1170774</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1170879</URL>
      <Description>SUSE Bug 1170879</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1170891</URL>
      <Description>SUSE Bug 1170891</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1170895</URL>
      <Description>SUSE Bug 1170895</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171000</URL>
      <Description>SUSE Bug 1171000</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171068</URL>
      <Description>SUSE Bug 1171068</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171073</URL>
      <Description>SUSE Bug 1171073</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171078</URL>
      <Description>SUSE Bug 1171078</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171117</URL>
      <Description>SUSE Bug 1171117</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171150</URL>
      <Description>SUSE Bug 1171150</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171156</URL>
      <Description>SUSE Bug 1171156</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171189</URL>
      <Description>SUSE Bug 1171189</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171191</URL>
      <Description>SUSE Bug 1171191</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171218</URL>
      <Description>SUSE Bug 1171218</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171219</URL>
      <Description>SUSE Bug 1171219</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171220</URL>
      <Description>SUSE Bug 1171220</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171236</URL>
      <Description>SUSE Bug 1171236</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171242</URL>
      <Description>SUSE Bug 1171242</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171246</URL>
      <Description>SUSE Bug 1171246</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171285</URL>
      <Description>SUSE Bug 1171285</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171293</URL>
      <Description>SUSE Bug 1171293</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171374</URL>
      <Description>SUSE Bug 1171374</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171390</URL>
      <Description>SUSE Bug 1171390</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171391</URL>
      <Description>SUSE Bug 1171391</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171392</URL>
      <Description>SUSE Bug 1171392</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171417</URL>
      <Description>SUSE Bug 1171417</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171426</URL>
      <Description>SUSE Bug 1171426</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171507</URL>
      <Description>SUSE Bug 1171507</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171513</URL>
      <Description>SUSE Bug 1171513</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171514</URL>
      <Description>SUSE Bug 1171514</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171529</URL>
      <Description>SUSE Bug 1171529</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171530</URL>
      <Description>SUSE Bug 1171530</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171558</URL>
      <Description>SUSE Bug 1171558</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171634</URL>
      <Description>SUSE Bug 1171634</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171644</URL>
      <Description>SUSE Bug 1171644</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171662</URL>
      <Description>SUSE Bug 1171662</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171675</URL>
      <Description>SUSE Bug 1171675</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171688</URL>
      <Description>SUSE Bug 1171688</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171699</URL>
      <Description>SUSE Bug 1171699</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171709</URL>
      <Description>SUSE Bug 1171709</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171730</URL>
      <Description>SUSE Bug 1171730</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171732</URL>
      <Description>SUSE Bug 1171732</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171736</URL>
      <Description>SUSE Bug 1171736</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171739</URL>
      <Description>SUSE Bug 1171739</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171742</URL>
      <Description>SUSE Bug 1171742</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171743</URL>
      <Description>SUSE Bug 1171743</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171759</URL>
      <Description>SUSE Bug 1171759</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171773</URL>
      <Description>SUSE Bug 1171773</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171774</URL>
      <Description>SUSE Bug 1171774</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171775</URL>
      <Description>SUSE Bug 1171775</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171776</URL>
      <Description>SUSE Bug 1171776</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171777</URL>
      <Description>SUSE Bug 1171777</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171778</URL>
      <Description>SUSE Bug 1171778</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171779</URL>
      <Description>SUSE Bug 1171779</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171780</URL>
      <Description>SUSE Bug 1171780</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171781</URL>
      <Description>SUSE Bug 1171781</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171782</URL>
      <Description>SUSE Bug 1171782</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171783</URL>
      <Description>SUSE Bug 1171783</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171784</URL>
      <Description>SUSE Bug 1171784</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171785</URL>
      <Description>SUSE Bug 1171785</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171786</URL>
      <Description>SUSE Bug 1171786</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171787</URL>
      <Description>SUSE Bug 1171787</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171788</URL>
      <Description>SUSE Bug 1171788</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171789</URL>
      <Description>SUSE Bug 1171789</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171790</URL>
      <Description>SUSE Bug 1171790</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171791</URL>
      <Description>SUSE Bug 1171791</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171792</URL>
      <Description>SUSE Bug 1171792</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171793</URL>
      <Description>SUSE Bug 1171793</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171794</URL>
      <Description>SUSE Bug 1171794</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171795</URL>
      <Description>SUSE Bug 1171795</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171796</URL>
      <Description>SUSE Bug 1171796</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171797</URL>
      <Description>SUSE Bug 1171797</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171798</URL>
      <Description>SUSE Bug 1171798</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171799</URL>
      <Description>SUSE Bug 1171799</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171810</URL>
      <Description>SUSE Bug 1171810</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171827</URL>
      <Description>SUSE Bug 1171827</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171828</URL>
      <Description>SUSE Bug 1171828</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171832</URL>
      <Description>SUSE Bug 1171832</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171833</URL>
      <Description>SUSE Bug 1171833</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171834</URL>
      <Description>SUSE Bug 1171834</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171835</URL>
      <Description>SUSE Bug 1171835</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171839</URL>
      <Description>SUSE Bug 1171839</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171840</URL>
      <Description>SUSE Bug 1171840</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171841</URL>
      <Description>SUSE Bug 1171841</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171842</URL>
      <Description>SUSE Bug 1171842</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171843</URL>
      <Description>SUSE Bug 1171843</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171844</URL>
      <Description>SUSE Bug 1171844</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171849</URL>
      <Description>SUSE Bug 1171849</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171857</URL>
      <Description>SUSE Bug 1171857</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171868</URL>
      <Description>SUSE Bug 1171868</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171904</URL>
      <Description>SUSE Bug 1171904</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171915</URL>
      <Description>SUSE Bug 1171915</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171982</URL>
      <Description>SUSE Bug 1171982</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171983</URL>
      <Description>SUSE Bug 1171983</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171988</URL>
      <Description>SUSE Bug 1171988</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172017</URL>
      <Description>SUSE Bug 1172017</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172046</URL>
      <Description>SUSE Bug 1172046</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172061</URL>
      <Description>SUSE Bug 1172061</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172062</URL>
      <Description>SUSE Bug 1172062</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172063</URL>
      <Description>SUSE Bug 1172063</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172064</URL>
      <Description>SUSE Bug 1172064</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172065</URL>
      <Description>SUSE Bug 1172065</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172066</URL>
      <Description>SUSE Bug 1172066</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172067</URL>
      <Description>SUSE Bug 1172067</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172068</URL>
      <Description>SUSE Bug 1172068</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172069</URL>
      <Description>SUSE Bug 1172069</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172073</URL>
      <Description>SUSE Bug 1172073</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172086</URL>
      <Description>SUSE Bug 1172086</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172095</URL>
      <Description>SUSE Bug 1172095</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172108</URL>
      <Description>SUSE Bug 1172108</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172145</URL>
      <Description>SUSE Bug 1172145</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172169</URL>
      <Description>SUSE Bug 1172169</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172170</URL>
      <Description>SUSE Bug 1172170</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172197</URL>
      <Description>SUSE Bug 1172197</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172201</URL>
      <Description>SUSE Bug 1172201</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172208</URL>
      <Description>SUSE Bug 1172208</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172223</URL>
      <Description>SUSE Bug 1172223</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172247</URL>
      <Description>SUSE Bug 1172247</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172317</URL>
      <Description>SUSE Bug 1172317</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172342</URL>
      <Description>SUSE Bug 1172342</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172343</URL>
      <Description>SUSE Bug 1172343</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172344</URL>
      <Description>SUSE Bug 1172344</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172365</URL>
      <Description>SUSE Bug 1172365</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172366</URL>
      <Description>SUSE Bug 1172366</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172374</URL>
      <Description>SUSE Bug 1172374</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172391</URL>
      <Description>SUSE Bug 1172391</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172393</URL>
      <Description>SUSE Bug 1172393</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172394</URL>
      <Description>SUSE Bug 1172394</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172418</URL>
      <Description>SUSE Bug 1172418</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172419</URL>
      <Description>SUSE Bug 1172419</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172453</URL>
      <Description>SUSE Bug 1172453</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172458</URL>
      <Description>SUSE Bug 1172458</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172467</URL>
      <Description>SUSE Bug 1172467</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172484</URL>
      <Description>SUSE Bug 1172484</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172537</URL>
      <Description>SUSE Bug 1172537</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172543</URL>
      <Description>SUSE Bug 1172543</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172687</URL>
      <Description>SUSE Bug 1172687</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172719</URL>
      <Description>SUSE Bug 1172719</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172733</URL>
      <Description>SUSE Bug 1172733</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172739</URL>
      <Description>SUSE Bug 1172739</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172751</URL>
      <Description>SUSE Bug 1172751</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172757</URL>
      <Description>SUSE Bug 1172757</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172759</URL>
      <Description>SUSE Bug 1172759</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172775</URL>
      <Description>SUSE Bug 1172775</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172781</URL>
      <Description>SUSE Bug 1172781</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172782</URL>
      <Description>SUSE Bug 1172782</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172783</URL>
      <Description>SUSE Bug 1172783</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172814</URL>
      <Description>SUSE Bug 1172814</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172823</URL>
      <Description>SUSE Bug 1172823</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172841</URL>
      <Description>SUSE Bug 1172841</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172871</URL>
      <Description>SUSE Bug 1172871</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172873</URL>
      <Description>SUSE Bug 1172873</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172938</URL>
      <Description>SUSE Bug 1172938</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172939</URL>
      <Description>SUSE Bug 1172939</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172940</URL>
      <Description>SUSE Bug 1172940</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172956</URL>
      <Description>SUSE Bug 1172956</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172963</URL>
      <Description>SUSE Bug 1172963</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172983</URL>
      <Description>SUSE Bug 1172983</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172984</URL>
      <Description>SUSE Bug 1172984</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172985</URL>
      <Description>SUSE Bug 1172985</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172986</URL>
      <Description>SUSE Bug 1172986</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172987</URL>
      <Description>SUSE Bug 1172987</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172988</URL>
      <Description>SUSE Bug 1172988</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172989</URL>
      <Description>SUSE Bug 1172989</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172990</URL>
      <Description>SUSE Bug 1172990</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172999</URL>
      <Description>SUSE Bug 1172999</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173017</URL>
      <Description>SUSE Bug 1173017</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173068</URL>
      <Description>SUSE Bug 1173068</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173074</URL>
      <Description>SUSE Bug 1173074</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173085</URL>
      <Description>SUSE Bug 1173085</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173115</URL>
      <Description>SUSE Bug 1173115</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173139</URL>
      <Description>SUSE Bug 1173139</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173206</URL>
      <Description>SUSE Bug 1173206</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173267</URL>
      <Description>SUSE Bug 1173267</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173271</URL>
      <Description>SUSE Bug 1173271</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173280</URL>
      <Description>SUSE Bug 1173280</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173284</URL>
      <Description>SUSE Bug 1173284</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173428</URL>
      <Description>SUSE Bug 1173428</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173438</URL>
      <Description>SUSE Bug 1173438</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173461</URL>
      <Description>SUSE Bug 1173461</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173468</URL>
      <Description>SUSE Bug 1173468</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173485</URL>
      <Description>SUSE Bug 1173485</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173514</URL>
      <Description>SUSE Bug 1173514</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173552</URL>
      <Description>SUSE Bug 1173552</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173573</URL>
      <Description>SUSE Bug 1173573</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173625</URL>
      <Description>SUSE Bug 1173625</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173746</URL>
      <Description>SUSE Bug 1173746</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173776</URL>
      <Description>SUSE Bug 1173776</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173798</URL>
      <Description>SUSE Bug 1173798</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173813</URL>
      <Description>SUSE Bug 1173813</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173817</URL>
      <Description>SUSE Bug 1173817</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173818</URL>
      <Description>SUSE Bug 1173818</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173820</URL>
      <Description>SUSE Bug 1173820</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173822</URL>
      <Description>SUSE Bug 1173822</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173823</URL>
      <Description>SUSE Bug 1173823</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173824</URL>
      <Description>SUSE Bug 1173824</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173825</URL>
      <Description>SUSE Bug 1173825</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173826</URL>
      <Description>SUSE Bug 1173826</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173827</URL>
      <Description>SUSE Bug 1173827</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173828</URL>
      <Description>SUSE Bug 1173828</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173830</URL>
      <Description>SUSE Bug 1173830</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173831</URL>
      <Description>SUSE Bug 1173831</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173832</URL>
      <Description>SUSE Bug 1173832</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173833</URL>
      <Description>SUSE Bug 1173833</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173834</URL>
      <Description>SUSE Bug 1173834</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173836</URL>
      <Description>SUSE Bug 1173836</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173837</URL>
      <Description>SUSE Bug 1173837</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173838</URL>
      <Description>SUSE Bug 1173838</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173839</URL>
      <Description>SUSE Bug 1173839</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173841</URL>
      <Description>SUSE Bug 1173841</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173843</URL>
      <Description>SUSE Bug 1173843</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173844</URL>
      <Description>SUSE Bug 1173844</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173845</URL>
      <Description>SUSE Bug 1173845</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173847</URL>
      <Description>SUSE Bug 1173847</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173849</URL>
      <Description>SUSE Bug 1173849</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173860</URL>
      <Description>SUSE Bug 1173860</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173894</URL>
      <Description>SUSE Bug 1173894</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173941</URL>
      <Description>SUSE Bug 1173941</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173954</URL>
      <Description>SUSE Bug 1173954</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174002</URL>
      <Description>SUSE Bug 1174002</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174003</URL>
      <Description>SUSE Bug 1174003</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174018</URL>
      <Description>SUSE Bug 1174018</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174026</URL>
      <Description>SUSE Bug 1174026</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174029</URL>
      <Description>SUSE Bug 1174029</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174072</URL>
      <Description>SUSE Bug 1174072</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174098</URL>
      <Description>SUSE Bug 1174098</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174110</URL>
      <Description>SUSE Bug 1174110</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174111</URL>
      <Description>SUSE Bug 1174111</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174116</URL>
      <Description>SUSE Bug 1174116</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174126</URL>
      <Description>SUSE Bug 1174126</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174127</URL>
      <Description>SUSE Bug 1174127</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174128</URL>
      <Description>SUSE Bug 1174128</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174129</URL>
      <Description>SUSE Bug 1174129</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174146</URL>
      <Description>SUSE Bug 1174146</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174185</URL>
      <Description>SUSE Bug 1174185</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174205</URL>
      <Description>SUSE Bug 1174205</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174244</URL>
      <Description>SUSE Bug 1174244</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174263</URL>
      <Description>SUSE Bug 1174263</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174264</URL>
      <Description>SUSE Bug 1174264</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174331</URL>
      <Description>SUSE Bug 1174331</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174332</URL>
      <Description>SUSE Bug 1174332</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174333</URL>
      <Description>SUSE Bug 1174333</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174345</URL>
      <Description>SUSE Bug 1174345</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174356</URL>
      <Description>SUSE Bug 1174356</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174358</URL>
      <Description>SUSE Bug 1174358</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174362</URL>
      <Description>SUSE Bug 1174362</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174387</URL>
      <Description>SUSE Bug 1174387</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174396</URL>
      <Description>SUSE Bug 1174396</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174398</URL>
      <Description>SUSE Bug 1174398</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174407</URL>
      <Description>SUSE Bug 1174407</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174409</URL>
      <Description>SUSE Bug 1174409</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174411</URL>
      <Description>SUSE Bug 1174411</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174438</URL>
      <Description>SUSE Bug 1174438</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174462</URL>
      <Description>SUSE Bug 1174462</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174484</URL>
      <Description>SUSE Bug 1174484</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174486</URL>
      <Description>SUSE Bug 1174486</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174513</URL>
      <Description>SUSE Bug 1174513</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174527</URL>
      <Description>SUSE Bug 1174527</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174625</URL>
      <Description>SUSE Bug 1174625</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174627</URL>
      <Description>SUSE Bug 1174627</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174645</URL>
      <Description>SUSE Bug 1174645</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174689</URL>
      <Description>SUSE Bug 1174689</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174699</URL>
      <Description>SUSE Bug 1174699</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174737</URL>
      <Description>SUSE Bug 1174737</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174748</URL>
      <Description>SUSE Bug 1174748</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174757</URL>
      <Description>SUSE Bug 1174757</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174762</URL>
      <Description>SUSE Bug 1174762</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174770</URL>
      <Description>SUSE Bug 1174770</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174771</URL>
      <Description>SUSE Bug 1174771</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174777</URL>
      <Description>SUSE Bug 1174777</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174805</URL>
      <Description>SUSE Bug 1174805</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174824</URL>
      <Description>SUSE Bug 1174824</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174825</URL>
      <Description>SUSE Bug 1174825</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174852</URL>
      <Description>SUSE Bug 1174852</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174865</URL>
      <Description>SUSE Bug 1174865</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174880</URL>
      <Description>SUSE Bug 1174880</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174897</URL>
      <Description>SUSE Bug 1174897</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174899</URL>
      <Description>SUSE Bug 1174899</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174906</URL>
      <Description>SUSE Bug 1174906</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174969</URL>
      <Description>SUSE Bug 1174969</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175009</URL>
      <Description>SUSE Bug 1175009</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175010</URL>
      <Description>SUSE Bug 1175010</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175011</URL>
      <Description>SUSE Bug 1175011</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175012</URL>
      <Description>SUSE Bug 1175012</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175013</URL>
      <Description>SUSE Bug 1175013</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175014</URL>
      <Description>SUSE Bug 1175014</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175015</URL>
      <Description>SUSE Bug 1175015</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175016</URL>
      <Description>SUSE Bug 1175016</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175017</URL>
      <Description>SUSE Bug 1175017</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175018</URL>
      <Description>SUSE Bug 1175018</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175019</URL>
      <Description>SUSE Bug 1175019</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175020</URL>
      <Description>SUSE Bug 1175020</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175021</URL>
      <Description>SUSE Bug 1175021</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175052</URL>
      <Description>SUSE Bug 1175052</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175079</URL>
      <Description>SUSE Bug 1175079</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175112</URL>
      <Description>SUSE Bug 1175112</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175116</URL>
      <Description>SUSE Bug 1175116</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175128</URL>
      <Description>SUSE Bug 1175128</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175149</URL>
      <Description>SUSE Bug 1175149</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175175</URL>
      <Description>SUSE Bug 1175175</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175176</URL>
      <Description>SUSE Bug 1175176</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175180</URL>
      <Description>SUSE Bug 1175180</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175181</URL>
      <Description>SUSE Bug 1175181</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175182</URL>
      <Description>SUSE Bug 1175182</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175183</URL>
      <Description>SUSE Bug 1175183</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175184</URL>
      <Description>SUSE Bug 1175184</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175185</URL>
      <Description>SUSE Bug 1175185</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175186</URL>
      <Description>SUSE Bug 1175186</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175187</URL>
      <Description>SUSE Bug 1175187</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175188</URL>
      <Description>SUSE Bug 1175188</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175189</URL>
      <Description>SUSE Bug 1175189</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175190</URL>
      <Description>SUSE Bug 1175190</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175191</URL>
      <Description>SUSE Bug 1175191</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175192</URL>
      <Description>SUSE Bug 1175192</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175195</URL>
      <Description>SUSE Bug 1175195</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175199</URL>
      <Description>SUSE Bug 1175199</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175213</URL>
      <Description>SUSE Bug 1175213</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175232</URL>
      <Description>SUSE Bug 1175232</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175263</URL>
      <Description>SUSE Bug 1175263</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175284</URL>
      <Description>SUSE Bug 1175284</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175296</URL>
      <Description>SUSE Bug 1175296</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175306</URL>
      <Description>SUSE Bug 1175306</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175344</URL>
      <Description>SUSE Bug 1175344</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175345</URL>
      <Description>SUSE Bug 1175345</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175346</URL>
      <Description>SUSE Bug 1175346</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175347</URL>
      <Description>SUSE Bug 1175347</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175367</URL>
      <Description>SUSE Bug 1175367</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175377</URL>
      <Description>SUSE Bug 1175377</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175440</URL>
      <Description>SUSE Bug 1175440</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175480</URL>
      <Description>SUSE Bug 1175480</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175493</URL>
      <Description>SUSE Bug 1175493</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175546</URL>
      <Description>SUSE Bug 1175546</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175550</URL>
      <Description>SUSE Bug 1175550</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175599</URL>
      <Description>SUSE Bug 1175599</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175621</URL>
      <Description>SUSE Bug 1175621</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175654</URL>
      <Description>SUSE Bug 1175654</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175667</URL>
      <Description>SUSE Bug 1175667</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175691</URL>
      <Description>SUSE Bug 1175691</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175718</URL>
      <Description>SUSE Bug 1175718</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175721</URL>
      <Description>SUSE Bug 1175721</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175749</URL>
      <Description>SUSE Bug 1175749</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175768</URL>
      <Description>SUSE Bug 1175768</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175769</URL>
      <Description>SUSE Bug 1175769</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175770</URL>
      <Description>SUSE Bug 1175770</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175771</URL>
      <Description>SUSE Bug 1175771</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175772</URL>
      <Description>SUSE Bug 1175772</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175774</URL>
      <Description>SUSE Bug 1175774</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175775</URL>
      <Description>SUSE Bug 1175775</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175787</URL>
      <Description>SUSE Bug 1175787</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175807</URL>
      <Description>SUSE Bug 1175807</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175834</URL>
      <Description>SUSE Bug 1175834</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175873</URL>
      <Description>SUSE Bug 1175873</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175882</URL>
      <Description>SUSE Bug 1175882</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175898</URL>
      <Description>SUSE Bug 1175898</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175918</URL>
      <Description>SUSE Bug 1175918</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175952</URL>
      <Description>SUSE Bug 1175952</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175995</URL>
      <Description>SUSE Bug 1175995</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175996</URL>
      <Description>SUSE Bug 1175996</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175997</URL>
      <Description>SUSE Bug 1175997</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175998</URL>
      <Description>SUSE Bug 1175998</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175999</URL>
      <Description>SUSE Bug 1175999</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176000</URL>
      <Description>SUSE Bug 1176000</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176001</URL>
      <Description>SUSE Bug 1176001</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176019</URL>
      <Description>SUSE Bug 1176019</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176022</URL>
      <Description>SUSE Bug 1176022</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176038</URL>
      <Description>SUSE Bug 1176038</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176063</URL>
      <Description>SUSE Bug 1176063</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176069</URL>
      <Description>SUSE Bug 1176069</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176109</URL>
      <Description>SUSE Bug 1176109</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176137</URL>
      <Description>SUSE Bug 1176137</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176180</URL>
      <Description>SUSE Bug 1176180</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176200</URL>
      <Description>SUSE Bug 1176200</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176235</URL>
      <Description>SUSE Bug 1176235</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176236</URL>
      <Description>SUSE Bug 1176236</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176237</URL>
      <Description>SUSE Bug 1176237</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176242</URL>
      <Description>SUSE Bug 1176242</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176354</URL>
      <Description>SUSE Bug 1176354</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176357</URL>
      <Description>SUSE Bug 1176357</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176358</URL>
      <Description>SUSE Bug 1176358</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176359</URL>
      <Description>SUSE Bug 1176359</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176360</URL>
      <Description>SUSE Bug 1176360</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176361</URL>
      <Description>SUSE Bug 1176361</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176362</URL>
      <Description>SUSE Bug 1176362</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176363</URL>
      <Description>SUSE Bug 1176363</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176364</URL>
      <Description>SUSE Bug 1176364</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176365</URL>
      <Description>SUSE Bug 1176365</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176366</URL>
      <Description>SUSE Bug 1176366</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176367</URL>
      <Description>SUSE Bug 1176367</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176381</URL>
      <Description>SUSE Bug 1176381</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176396</URL>
      <Description>SUSE Bug 1176396</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176400</URL>
      <Description>SUSE Bug 1176400</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176423</URL>
      <Description>SUSE Bug 1176423</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176449</URL>
      <Description>SUSE Bug 1176449</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176481</URL>
      <Description>SUSE Bug 1176481</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176485</URL>
      <Description>SUSE Bug 1176485</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176486</URL>
      <Description>SUSE Bug 1176486</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176507</URL>
      <Description>SUSE Bug 1176507</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176536</URL>
      <Description>SUSE Bug 1176536</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176537</URL>
      <Description>SUSE Bug 1176537</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176538</URL>
      <Description>SUSE Bug 1176538</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176539</URL>
      <Description>SUSE Bug 1176539</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176540</URL>
      <Description>SUSE Bug 1176540</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176541</URL>
      <Description>SUSE Bug 1176541</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176542</URL>
      <Description>SUSE Bug 1176542</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176543</URL>
      <Description>SUSE Bug 1176543</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176544</URL>
      <Description>SUSE Bug 1176544</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176545</URL>
      <Description>SUSE Bug 1176545</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176546</URL>
      <Description>SUSE Bug 1176546</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176548</URL>
      <Description>SUSE Bug 1176548</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176558</URL>
      <Description>SUSE Bug 1176558</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176559</URL>
      <Description>SUSE Bug 1176559</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176564</URL>
      <Description>SUSE Bug 1176564</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176586</URL>
      <Description>SUSE Bug 1176586</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176587</URL>
      <Description>SUSE Bug 1176587</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176588</URL>
      <Description>SUSE Bug 1176588</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176659</URL>
      <Description>SUSE Bug 1176659</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176698</URL>
      <Description>SUSE Bug 1176698</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176699</URL>
      <Description>SUSE Bug 1176699</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176700</URL>
      <Description>SUSE Bug 1176700</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176713</URL>
      <Description>SUSE Bug 1176713</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176721</URL>
      <Description>SUSE Bug 1176721</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176722</URL>
      <Description>SUSE Bug 1176722</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176725</URL>
      <Description>SUSE Bug 1176725</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176732</URL>
      <Description>SUSE Bug 1176732</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176763</URL>
      <Description>SUSE Bug 1176763</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176775</URL>
      <Description>SUSE Bug 1176775</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176788</URL>
      <Description>SUSE Bug 1176788</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176789</URL>
      <Description>SUSE Bug 1176789</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176833</URL>
      <Description>SUSE Bug 1176833</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176855</URL>
      <Description>SUSE Bug 1176855</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176869</URL>
      <Description>SUSE Bug 1176869</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176877</URL>
      <Description>SUSE Bug 1176877</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176907</URL>
      <Description>SUSE Bug 1176907</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176925</URL>
      <Description>SUSE Bug 1176925</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176942</URL>
      <Description>SUSE Bug 1176942</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176956</URL>
      <Description>SUSE Bug 1176956</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176962</URL>
      <Description>SUSE Bug 1176962</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176979</URL>
      <Description>SUSE Bug 1176979</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176980</URL>
      <Description>SUSE Bug 1176980</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176983</URL>
      <Description>SUSE Bug 1176983</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176990</URL>
      <Description>SUSE Bug 1176990</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177021</URL>
      <Description>SUSE Bug 1177021</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177030</URL>
      <Description>SUSE Bug 1177030</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177066</URL>
      <Description>SUSE Bug 1177066</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177070</URL>
      <Description>SUSE Bug 1177070</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177086</URL>
      <Description>SUSE Bug 1177086</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177090</URL>
      <Description>SUSE Bug 1177090</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177109</URL>
      <Description>SUSE Bug 1177109</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177121</URL>
      <Description>SUSE Bug 1177121</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177193</URL>
      <Description>SUSE Bug 1177193</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177194</URL>
      <Description>SUSE Bug 1177194</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177206</URL>
      <Description>SUSE Bug 1177206</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177258</URL>
      <Description>SUSE Bug 1177258</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177271</URL>
      <Description>SUSE Bug 1177271</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177281</URL>
      <Description>SUSE Bug 1177281</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177283</URL>
      <Description>SUSE Bug 1177283</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177284</URL>
      <Description>SUSE Bug 1177284</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177285</URL>
      <Description>SUSE Bug 1177285</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177286</URL>
      <Description>SUSE Bug 1177286</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177297</URL>
      <Description>SUSE Bug 1177297</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177326</URL>
      <Description>SUSE Bug 1177326</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177353</URL>
      <Description>SUSE Bug 1177353</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177384</URL>
      <Description>SUSE Bug 1177384</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177397</URL>
      <Description>SUSE Bug 1177397</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177410</URL>
      <Description>SUSE Bug 1177410</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177411</URL>
      <Description>SUSE Bug 1177411</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177470</URL>
      <Description>SUSE Bug 1177470</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177500</URL>
      <Description>SUSE Bug 1177500</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177511</URL>
      <Description>SUSE Bug 1177511</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177617</URL>
      <Description>SUSE Bug 1177617</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177666</URL>
      <Description>SUSE Bug 1177666</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177679</URL>
      <Description>SUSE Bug 1177679</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177681</URL>
      <Description>SUSE Bug 1177681</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177683</URL>
      <Description>SUSE Bug 1177683</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177687</URL>
      <Description>SUSE Bug 1177687</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177694</URL>
      <Description>SUSE Bug 1177694</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177697</URL>
      <Description>SUSE Bug 1177697</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177698</URL>
      <Description>SUSE Bug 1177698</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177703</URL>
      <Description>SUSE Bug 1177703</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177719</URL>
      <Description>SUSE Bug 1177719</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177724</URL>
      <Description>SUSE Bug 1177724</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177725</URL>
      <Description>SUSE Bug 1177725</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177726</URL>
      <Description>SUSE Bug 1177726</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177733</URL>
      <Description>SUSE Bug 1177733</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177739</URL>
      <Description>SUSE Bug 1177739</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177749</URL>
      <Description>SUSE Bug 1177749</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177750</URL>
      <Description>SUSE Bug 1177750</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177754</URL>
      <Description>SUSE Bug 1177754</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177755</URL>
      <Description>SUSE Bug 1177755</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177765</URL>
      <Description>SUSE Bug 1177765</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177766</URL>
      <Description>SUSE Bug 1177766</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177799</URL>
      <Description>SUSE Bug 1177799</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177801</URL>
      <Description>SUSE Bug 1177801</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177814</URL>
      <Description>SUSE Bug 1177814</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177817</URL>
      <Description>SUSE Bug 1177817</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177820</URL>
      <Description>SUSE Bug 1177820</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177854</URL>
      <Description>SUSE Bug 1177854</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177855</URL>
      <Description>SUSE Bug 1177855</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177856</URL>
      <Description>SUSE Bug 1177856</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177861</URL>
      <Description>SUSE Bug 1177861</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178002</URL>
      <Description>SUSE Bug 1178002</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178049</URL>
      <Description>SUSE Bug 1178049</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178079</URL>
      <Description>SUSE Bug 1178079</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178123</URL>
      <Description>SUSE Bug 1178123</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178166</URL>
      <Description>SUSE Bug 1178166</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178173</URL>
      <Description>SUSE Bug 1178173</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178175</URL>
      <Description>SUSE Bug 1178175</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178176</URL>
      <Description>SUSE Bug 1178176</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178177</URL>
      <Description>SUSE Bug 1178177</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178182</URL>
      <Description>SUSE Bug 1178182</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178183</URL>
      <Description>SUSE Bug 1178183</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178184</URL>
      <Description>SUSE Bug 1178184</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178185</URL>
      <Description>SUSE Bug 1178185</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178186</URL>
      <Description>SUSE Bug 1178186</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178190</URL>
      <Description>SUSE Bug 1178190</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178191</URL>
      <Description>SUSE Bug 1178191</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178203</URL>
      <Description>SUSE Bug 1178203</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178227</URL>
      <Description>SUSE Bug 1178227</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178246</URL>
      <Description>SUSE Bug 1178246</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178255</URL>
      <Description>SUSE Bug 1178255</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178270</URL>
      <Description>SUSE Bug 1178270</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178286</URL>
      <Description>SUSE Bug 1178286</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178307</URL>
      <Description>SUSE Bug 1178307</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178330</URL>
      <Description>SUSE Bug 1178330</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178393</URL>
      <Description>SUSE Bug 1178393</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178395</URL>
      <Description>SUSE Bug 1178395</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178401</URL>
      <Description>SUSE Bug 1178401</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178426</URL>
      <Description>SUSE Bug 1178426</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178461</URL>
      <Description>SUSE Bug 1178461</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178579</URL>
      <Description>SUSE Bug 1178579</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178581</URL>
      <Description>SUSE Bug 1178581</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178584</URL>
      <Description>SUSE Bug 1178584</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178585</URL>
      <Description>SUSE Bug 1178585</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178589</URL>
      <Description>SUSE Bug 1178589</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178590</URL>
      <Description>SUSE Bug 1178590</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178612</URL>
      <Description>SUSE Bug 1178612</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178634</URL>
      <Description>SUSE Bug 1178634</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178635</URL>
      <Description>SUSE Bug 1178635</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178653</URL>
      <Description>SUSE Bug 1178653</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178659</URL>
      <Description>SUSE Bug 1178659</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178660</URL>
      <Description>SUSE Bug 1178660</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178661</URL>
      <Description>SUSE Bug 1178661</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178669</URL>
      <Description>SUSE Bug 1178669</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178686</URL>
      <Description>SUSE Bug 1178686</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178740</URL>
      <Description>SUSE Bug 1178740</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178755</URL>
      <Description>SUSE Bug 1178755</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178756</URL>
      <Description>SUSE Bug 1178756</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178762</URL>
      <Description>SUSE Bug 1178762</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178780</URL>
      <Description>SUSE Bug 1178780</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178838</URL>
      <Description>SUSE Bug 1178838</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178853</URL>
      <Description>SUSE Bug 1178853</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178886</URL>
      <Description>SUSE Bug 1178886</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179001</URL>
      <Description>SUSE Bug 1179001</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179012</URL>
      <Description>SUSE Bug 1179012</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179014</URL>
      <Description>SUSE Bug 1179014</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179015</URL>
      <Description>SUSE Bug 1179015</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179045</URL>
      <Description>SUSE Bug 1179045</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179076</URL>
      <Description>SUSE Bug 1179076</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179082</URL>
      <Description>SUSE Bug 1179082</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179107</URL>
      <Description>SUSE Bug 1179107</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179140</URL>
      <Description>SUSE Bug 1179140</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179141</URL>
      <Description>SUSE Bug 1179141</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179160</URL>
      <Description>SUSE Bug 1179160</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179201</URL>
      <Description>SUSE Bug 1179201</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179204</URL>
      <Description>SUSE Bug 1179204</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179211</URL>
      <Description>SUSE Bug 1179211</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179217</URL>
      <Description>SUSE Bug 1179217</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179419</URL>
      <Description>SUSE Bug 1179419</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179424</URL>
      <Description>SUSE Bug 1179424</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179425</URL>
      <Description>SUSE Bug 1179425</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179426</URL>
      <Description>SUSE Bug 1179426</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179427</URL>
      <Description>SUSE Bug 1179427</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179429</URL>
      <Description>SUSE Bug 1179429</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179432</URL>
      <Description>SUSE Bug 1179432</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179434</URL>
      <Description>SUSE Bug 1179434</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179435</URL>
      <Description>SUSE Bug 1179435</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179442</URL>
      <Description>SUSE Bug 1179442</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179519</URL>
      <Description>SUSE Bug 1179519</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179550</URL>
      <Description>SUSE Bug 1179550</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179575</URL>
      <Description>SUSE Bug 1179575</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179578</URL>
      <Description>SUSE Bug 1179578</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179601</URL>
      <Description>SUSE Bug 1179601</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179604</URL>
      <Description>SUSE Bug 1179604</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179639</URL>
      <Description>SUSE Bug 1179639</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179652</URL>
      <Description>SUSE Bug 1179652</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179656</URL>
      <Description>SUSE Bug 1179656</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179670</URL>
      <Description>SUSE Bug 1179670</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179671</URL>
      <Description>SUSE Bug 1179671</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179672</URL>
      <Description>SUSE Bug 1179672</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179673</URL>
      <Description>SUSE Bug 1179673</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179675</URL>
      <Description>SUSE Bug 1179675</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179676</URL>
      <Description>SUSE Bug 1179676</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179677</URL>
      <Description>SUSE Bug 1179677</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179678</URL>
      <Description>SUSE Bug 1179678</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179679</URL>
      <Description>SUSE Bug 1179679</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179680</URL>
      <Description>SUSE Bug 1179680</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179681</URL>
      <Description>SUSE Bug 1179681</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179682</URL>
      <Description>SUSE Bug 1179682</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179683</URL>
      <Description>SUSE Bug 1179683</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179684</URL>
      <Description>SUSE Bug 1179684</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179685</URL>
      <Description>SUSE Bug 1179685</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179687</URL>
      <Description>SUSE Bug 1179687</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179688</URL>
      <Description>SUSE Bug 1179688</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179689</URL>
      <Description>SUSE Bug 1179689</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179690</URL>
      <Description>SUSE Bug 1179690</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179703</URL>
      <Description>SUSE Bug 1179703</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179704</URL>
      <Description>SUSE Bug 1179704</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179707</URL>
      <Description>SUSE Bug 1179707</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179709</URL>
      <Description>SUSE Bug 1179709</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179710</URL>
      <Description>SUSE Bug 1179710</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179711</URL>
      <Description>SUSE Bug 1179711</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179712</URL>
      <Description>SUSE Bug 1179712</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179713</URL>
      <Description>SUSE Bug 1179713</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179714</URL>
      <Description>SUSE Bug 1179714</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179715</URL>
      <Description>SUSE Bug 1179715</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179716</URL>
      <Description>SUSE Bug 1179716</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179745</URL>
      <Description>SUSE Bug 1179745</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179763</URL>
      <Description>SUSE Bug 1179763</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179887</URL>
      <Description>SUSE Bug 1179887</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179888</URL>
      <Description>SUSE Bug 1179888</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179892</URL>
      <Description>SUSE Bug 1179892</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179896</URL>
      <Description>SUSE Bug 1179896</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179960</URL>
      <Description>SUSE Bug 1179960</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179963</URL>
      <Description>SUSE Bug 1179963</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180027</URL>
      <Description>SUSE Bug 1180027</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180029</URL>
      <Description>SUSE Bug 1180029</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180031</URL>
      <Description>SUSE Bug 1180031</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180052</URL>
      <Description>SUSE Bug 1180052</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180056</URL>
      <Description>SUSE Bug 1180056</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180086</URL>
      <Description>SUSE Bug 1180086</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180117</URL>
      <Description>SUSE Bug 1180117</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180258</URL>
      <Description>SUSE Bug 1180258</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180261</URL>
      <Description>SUSE Bug 1180261</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180349</URL>
      <Description>SUSE Bug 1180349</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180506</URL>
      <Description>SUSE Bug 1180506</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180541</URL>
      <Description>SUSE Bug 1180541</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180559</URL>
      <Description>SUSE Bug 1180559</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180566</URL>
      <Description>SUSE Bug 1180566</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/173030</URL>
      <Description>SUSE Bug 173030</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/744692</URL>
      <Description>SUSE Bug 744692</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/789311</URL>
      <Description>SUSE Bug 789311</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/954532</URL>
      <Description>SUSE Bug 954532</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/995541</URL>
      <Description>SUSE Bug 995541</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19462/</URL>
      <Description>SUSE CVE CVE-2019-19462 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-20810/</URL>
      <Description>SUSE CVE CVE-2019-20810 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-20812/</URL>
      <Description>SUSE CVE CVE-2019-20812 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-0110/</URL>
      <Description>SUSE CVE CVE-2020-0110 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-0305/</URL>
      <Description>SUSE CVE CVE-2020-0305 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-0404/</URL>
      <Description>SUSE CVE CVE-2020-0404 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-0427/</URL>
      <Description>SUSE CVE CVE-2020-0427 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-0431/</URL>
      <Description>SUSE CVE CVE-2020-0431 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-0432/</URL>
      <Description>SUSE CVE CVE-2020-0432 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-0444/</URL>
      <Description>SUSE CVE CVE-2020-0444 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-0465/</URL>
      <Description>SUSE CVE CVE-2020-0465 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-0466/</URL>
      <Description>SUSE CVE CVE-2020-0466 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-0543/</URL>
      <Description>SUSE CVE CVE-2020-0543 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10135/</URL>
      <Description>SUSE CVE CVE-2020-10135 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10711/</URL>
      <Description>SUSE CVE CVE-2020-10711 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10732/</URL>
      <Description>SUSE CVE CVE-2020-10732 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10751/</URL>
      <Description>SUSE CVE CVE-2020-10751 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10757/</URL>
      <Description>SUSE CVE CVE-2020-10757 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10766/</URL>
      <Description>SUSE CVE CVE-2020-10766 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10767/</URL>
      <Description>SUSE CVE CVE-2020-10767 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10768/</URL>
      <Description>SUSE CVE CVE-2020-10768 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10773/</URL>
      <Description>SUSE CVE CVE-2020-10773 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10781/</URL>
      <Description>SUSE CVE CVE-2020-10781 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-11668/</URL>
      <Description>SUSE CVE CVE-2020-11668 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-12351/</URL>
      <Description>SUSE CVE CVE-2020-12351 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-12352/</URL>
      <Description>SUSE CVE CVE-2020-12352 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-12652/</URL>
      <Description>SUSE CVE CVE-2020-12652 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-12656/</URL>
      <Description>SUSE CVE CVE-2020-12656 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-12769/</URL>
      <Description>SUSE CVE CVE-2020-12769 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-12771/</URL>
      <Description>SUSE CVE CVE-2020-12771 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-12888/</URL>
      <Description>SUSE CVE CVE-2020-12888 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-13143/</URL>
      <Description>SUSE CVE CVE-2020-13143 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-13974/</URL>
      <Description>SUSE CVE CVE-2020-13974 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14314/</URL>
      <Description>SUSE CVE CVE-2020-14314 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14331/</URL>
      <Description>SUSE CVE CVE-2020-14331 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14351/</URL>
      <Description>SUSE CVE CVE-2020-14351 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14356/</URL>
      <Description>SUSE CVE CVE-2020-14356 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14385/</URL>
      <Description>SUSE CVE CVE-2020-14385 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14386/</URL>
      <Description>SUSE CVE CVE-2020-14386 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14390/</URL>
      <Description>SUSE CVE CVE-2020-14390 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14416/</URL>
      <Description>SUSE CVE CVE-2020-14416 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15393/</URL>
      <Description>SUSE CVE CVE-2020-15393 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15436/</URL>
      <Description>SUSE CVE CVE-2020-15436 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15437/</URL>
      <Description>SUSE CVE CVE-2020-15437 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15780/</URL>
      <Description>SUSE CVE CVE-2020-15780 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-16120/</URL>
      <Description>SUSE CVE CVE-2020-16120 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-16166/</URL>
      <Description>SUSE CVE CVE-2020-16166 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-1749/</URL>
      <Description>SUSE CVE CVE-2020-1749 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-24490/</URL>
      <Description>SUSE CVE CVE-2020-24490 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25212/</URL>
      <Description>SUSE CVE CVE-2020-25212 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25284/</URL>
      <Description>SUSE CVE CVE-2020-25284 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25285/</URL>
      <Description>SUSE CVE CVE-2020-25285 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25641/</URL>
      <Description>SUSE CVE CVE-2020-25641 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25643/</URL>
      <Description>SUSE CVE CVE-2020-25643 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25645/</URL>
      <Description>SUSE CVE CVE-2020-25645 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25656/</URL>
      <Description>SUSE CVE CVE-2020-25656 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25668/</URL>
      <Description>SUSE CVE CVE-2020-25668 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25669/</URL>
      <Description>SUSE CVE CVE-2020-25669 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25704/</URL>
      <Description>SUSE CVE CVE-2020-25704 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25705/</URL>
      <Description>SUSE CVE CVE-2020-25705 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-26088/</URL>
      <Description>SUSE CVE CVE-2020-26088 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27068/</URL>
      <Description>SUSE CVE CVE-2020-27068 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27777/</URL>
      <Description>SUSE CVE CVE-2020-27777 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27786/</URL>
      <Description>SUSE CVE CVE-2020-27786 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27825/</URL>
      <Description>SUSE CVE CVE-2020-27825 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27830/</URL>
      <Description>SUSE CVE CVE-2020-27830 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-28915/</URL>
      <Description>SUSE CVE CVE-2020-28915 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-28941/</URL>
      <Description>SUSE CVE CVE-2020-28941 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-28974/</URL>
      <Description>SUSE CVE CVE-2020-28974 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29369/</URL>
      <Description>SUSE CVE CVE-2020-29369 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29370/</URL>
      <Description>SUSE CVE CVE-2020-29370 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29371/</URL>
      <Description>SUSE CVE CVE-2020-29371 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29373/</URL>
      <Description>SUSE CVE CVE-2020-29373 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29660/</URL>
      <Description>SUSE CVE CVE-2020-29660 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29661/</URL>
      <Description>SUSE CVE CVE-2020-29661 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-36158/</URL>
      <Description>SUSE CVE CVE-2020-36158 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-4788/</URL>
      <Description>SUSE CVE CVE-2020-4788 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-8694/</URL>
      <Description>SUSE CVE CVE-2020-8694 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.2">
      <Branch Type="Product Name" Name="openSUSE Leap 15.2">
        <FullProductName ProductID="openSUSE Leap 15.2" CPE="cpe:/o:opensuse:leap:15.2">openSUSE Leap 15.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="cluster-md-kmp-rt-5.3.18-lp152.3.5.1">
      <FullProductName ProductID="cluster-md-kmp-rt-5.3.18-lp152.3.5.1">cluster-md-kmp-rt-5.3.18-lp152.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1">
      <FullProductName ProductID="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1">cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dlm-kmp-rt-5.3.18-lp152.3.5.1">
      <FullProductName ProductID="dlm-kmp-rt-5.3.18-lp152.3.5.1">dlm-kmp-rt-5.3.18-lp152.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1">
      <FullProductName ProductID="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1">dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gfs2-kmp-rt-5.3.18-lp152.3.5.1">
      <FullProductName ProductID="gfs2-kmp-rt-5.3.18-lp152.3.5.1">gfs2-kmp-rt-5.3.18-lp152.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1">
      <FullProductName ProductID="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1">gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-rt-5.3.18-lp152.3.5.1">
      <FullProductName ProductID="kernel-devel-rt-5.3.18-lp152.3.5.1">kernel-devel-rt-5.3.18-lp152.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-5.3.18-lp152.3.5.1">
      <FullProductName ProductID="kernel-rt-5.3.18-lp152.3.5.1">kernel-rt-5.3.18-lp152.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-devel-5.3.18-lp152.3.5.1">
      <FullProductName ProductID="kernel-rt-devel-5.3.18-lp152.3.5.1">kernel-rt-devel-5.3.18-lp152.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-extra-5.3.18-lp152.3.5.1">
      <FullProductName ProductID="kernel-rt-extra-5.3.18-lp152.3.5.1">kernel-rt-extra-5.3.18-lp152.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-5.3.18-lp152.3.5.1">
      <FullProductName ProductID="kernel-rt_debug-5.3.18-lp152.3.5.1">kernel-rt_debug-5.3.18-lp152.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-devel-5.3.18-lp152.3.5.1">
      <FullProductName ProductID="kernel-rt_debug-devel-5.3.18-lp152.3.5.1">kernel-rt_debug-devel-5.3.18-lp152.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-extra-5.3.18-lp152.3.5.1">
      <FullProductName ProductID="kernel-rt_debug-extra-5.3.18-lp152.3.5.1">kernel-rt_debug-extra-5.3.18-lp152.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-rt-5.3.18-lp152.3.5.1">
      <FullProductName ProductID="kernel-source-rt-5.3.18-lp152.3.5.1">kernel-source-rt-5.3.18-lp152.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-rt-5.3.18-lp152.3.5.1">
      <FullProductName ProductID="kernel-syms-rt-5.3.18-lp152.3.5.1">kernel-syms-rt-5.3.18-lp152.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kselftests-kmp-rt-5.3.18-lp152.3.5.1">
      <FullProductName ProductID="kselftests-kmp-rt-5.3.18-lp152.3.5.1">kselftests-kmp-rt-5.3.18-lp152.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1">
      <FullProductName ProductID="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1">kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ocfs2-kmp-rt-5.3.18-lp152.3.5.1">
      <FullProductName ProductID="ocfs2-kmp-rt-5.3.18-lp152.3.5.1">ocfs2-kmp-rt-5.3.18-lp152.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1">
      <FullProductName ProductID="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1">ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="reiserfs-kmp-rt-5.3.18-lp152.3.5.1">
      <FullProductName ProductID="reiserfs-kmp-rt-5.3.18-lp152.3.5.1">reiserfs-kmp-rt-5.3.18-lp152.3.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1">
      <FullProductName ProductID="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1">reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</FullProductName>
    </Branch>
    <Relationship ProductReference="cluster-md-kmp-rt-5.3.18-lp152.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1">cluster-md-kmp-rt-5.3.18-lp152.3.5.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1">cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-rt-5.3.18-lp152.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1">dlm-kmp-rt-5.3.18-lp152.3.5.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1">dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-rt-5.3.18-lp152.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1">gfs2-kmp-rt-5.3.18-lp152.3.5.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1">gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-rt-5.3.18-lp152.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1">kernel-devel-rt-5.3.18-lp152.3.5.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-5.3.18-lp152.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1">kernel-rt-5.3.18-lp152.3.5.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-devel-5.3.18-lp152.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1">kernel-rt-devel-5.3.18-lp152.3.5.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-extra-5.3.18-lp152.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1">kernel-rt-extra-5.3.18-lp152.3.5.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt_debug-5.3.18-lp152.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1">kernel-rt_debug-5.3.18-lp152.3.5.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt_debug-devel-5.3.18-lp152.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1">kernel-rt_debug-devel-5.3.18-lp152.3.5.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt_debug-extra-5.3.18-lp152.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1">kernel-rt_debug-extra-5.3.18-lp152.3.5.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-rt-5.3.18-lp152.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1">kernel-source-rt-5.3.18-lp152.3.5.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-rt-5.3.18-lp152.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1">kernel-syms-rt-5.3.18-lp152.3.5.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="kselftests-kmp-rt-5.3.18-lp152.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1">kselftests-kmp-rt-5.3.18-lp152.3.5.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1">kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-rt-5.3.18-lp152.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1">ocfs2-kmp-rt-5.3.18-lp152.3.5.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1">ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="reiserfs-kmp-rt-5.3.18-lp152.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1">reiserfs-kmp-rt-5.3.18-lp152.3.5.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1">reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.</Note>
    </Notes>
    <CVE>CVE-2019-19462</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19462.html</URL>
        <Description>CVE-2019-19462</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158265</URL>
        <Description>SUSE Bug 1158265</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.</Note>
    </Notes>
    <CVE>CVE-2019-20810</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-20810.html</URL>
        <Description>CVE-2019-20810</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172458</URL>
        <Description>SUSE Bug 1172458</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.</Note>
    </Notes>
    <CVE>CVE-2019-20812</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-20812.html</URL>
        <Description>CVE-2019-20812</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172453</URL>
        <Description>SUSE Bug 1172453</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In psi_write of psi.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-148159562References: Upstream kernel</Note>
    </Notes>
    <CVE>CVE-2020-0110</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-0110.html</URL>
        <Description>CVE-2020-0110</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171374</URL>
        <Description>SUSE Bug 1171374</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174874</URL>
        <Description>SUSE Bug 1174874</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744</Note>
    </Notes>
    <CVE>CVE-2020-0305</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-0305.html</URL>
        <Description>CVE-2020-0305</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174462</URL>
        <Description>SUSE Bug 1174462</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel</Note>
    </Notes>
    <CVE>CVE-2020-0404</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-0404.html</URL>
        <Description>CVE-2020-0404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176423</URL>
        <Description>SUSE Bug 1176423</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171</Note>
    </Notes>
    <CVE>CVE-2020-0427</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-0427.html</URL>
        <Description>CVE-2020-0427</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176725</URL>
        <Description>SUSE Bug 1176725</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459</Note>
    </Notes>
    <CVE>CVE-2020-0431</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-0431.html</URL>
        <Description>CVE-2020-0431</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176722</URL>
        <Description>SUSE Bug 1176722</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176896</URL>
        <Description>SUSE Bug 1176896</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807</Note>
    </Notes>
    <CVE>CVE-2020-0432</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-0432.html</URL>
        <Description>CVE-2020-0432</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176721</URL>
        <Description>SUSE Bug 1176721</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177165</URL>
        <Description>SUSE Bug 1177165</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel</Note>
    </Notes>
    <CVE>CVE-2020-0444</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-0444.html</URL>
        <Description>CVE-2020-0444</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180027</URL>
        <Description>SUSE Bug 1180027</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180028</URL>
        <Description>SUSE Bug 1180028</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel</Note>
    </Notes>
    <CVE>CVE-2020-0465</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-0465.html</URL>
        <Description>CVE-2020-0465</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180029</URL>
        <Description>SUSE Bug 1180029</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180030</URL>
        <Description>SUSE Bug 1180030</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel</Note>
    </Notes>
    <CVE>CVE-2020-0466</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-0466.html</URL>
        <Description>CVE-2020-0466</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180031</URL>
        <Description>SUSE Bug 1180031</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180032</URL>
        <Description>SUSE Bug 1180032</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199255</URL>
        <Description>SUSE Bug 1199255</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200084</URL>
        <Description>SUSE Bug 1200084</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.</Note>
    </Notes>
    <CVE>CVE-2020-0543</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-0543.html</URL>
        <Description>CVE-2020-0543</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154824</URL>
        <Description>SUSE Bug 1154824</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172205</URL>
        <Description>SUSE Bug 1172205</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172206</URL>
        <Description>SUSE Bug 1172206</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172207</URL>
        <Description>SUSE Bug 1172207</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172770</URL>
        <Description>SUSE Bug 1172770</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.</Note>
    </Notes>
    <CVE>CVE-2020-10135</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.8</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10135.html</URL>
        <Description>CVE-2020-10135</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171988</URL>
        <Description>SUSE Bug 1171988</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.</Note>
    </Notes>
    <CVE>CVE-2020-10711</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10711.html</URL>
        <Description>CVE-2020-10711</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171191</URL>
        <Description>SUSE Bug 1171191</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.</Note>
    </Notes>
    <CVE>CVE-2020-10732</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10732.html</URL>
        <Description>CVE-2020-10732</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171220</URL>
        <Description>SUSE Bug 1171220</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.</Note>
    </Notes>
    <CVE>CVE-2020-10751</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10751.html</URL>
        <Description>CVE-2020-10751</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171189</URL>
        <Description>SUSE Bug 1171189</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174963</URL>
        <Description>SUSE Bug 1174963</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.</Note>
    </Notes>
    <CVE>CVE-2020-10757</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10757.html</URL>
        <Description>CVE-2020-10757</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159281</URL>
        <Description>SUSE Bug 1159281</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172317</URL>
        <Description>SUSE Bug 1172317</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172437</URL>
        <Description>SUSE Bug 1172437</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.</Note>
    </Notes>
    <CVE>CVE-2020-10766</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10766.html</URL>
        <Description>CVE-2020-10766</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159281</URL>
        <Description>SUSE Bug 1159281</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172781</URL>
        <Description>SUSE Bug 1172781</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.</Note>
    </Notes>
    <CVE>CVE-2020-10767</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10767.html</URL>
        <Description>CVE-2020-10767</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159281</URL>
        <Description>SUSE Bug 1159281</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172782</URL>
        <Description>SUSE Bug 1172782</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.</Note>
    </Notes>
    <CVE>CVE-2020-10768</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10768.html</URL>
        <Description>CVE-2020-10768</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159281</URL>
        <Description>SUSE Bug 1159281</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172783</URL>
        <Description>SUSE Bug 1172783</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A stack information leak flaw was found in s390/s390x in the Linux kernel's memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.</Note>
    </Notes>
    <CVE>CVE-2020-10773</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10773.html</URL>
        <Description>CVE-2020-10773</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172999</URL>
        <Description>SUSE Bug 1172999</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.</Note>
    </Notes>
    <CVE>CVE-2020-10781</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10781.html</URL>
        <Description>CVE-2020-10781</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173074</URL>
        <Description>SUSE Bug 1173074</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.</Note>
    </Notes>
    <CVE>CVE-2020-11668</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-11668.html</URL>
        <Description>CVE-2020-11668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1168952</URL>
        <Description>SUSE Bug 1168952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173942</URL>
        <Description>SUSE Bug 1173942</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.</Note>
    </Notes>
    <CVE>CVE-2020-12351</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-12351.html</URL>
        <Description>CVE-2020-12351</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177724</URL>
        <Description>SUSE Bug 1177724</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177729</URL>
        <Description>SUSE Bug 1177729</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178397</URL>
        <Description>SUSE Bug 1178397</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.</Note>
    </Notes>
    <CVE>CVE-2020-12352</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-12352.html</URL>
        <Description>CVE-2020-12352</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177725</URL>
        <Description>SUSE Bug 1177725</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178398</URL>
        <Description>SUSE Bug 1178398</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a "double fetch" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states "The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power."</Note>
    </Notes>
    <CVE>CVE-2020-12652</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-12652.html</URL>
        <Description>CVE-2020-12652</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171218</URL>
        <Description>SUSE Bug 1171218</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED ** gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug.</Note>
    </Notes>
    <CVE>CVE-2020-12656</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-12656.html</URL>
        <Description>CVE-2020-12656</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171219</URL>
        <Description>SUSE Bug 1171219</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.</Note>
    </Notes>
    <CVE>CVE-2020-12769</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-12769.html</URL>
        <Description>CVE-2020-12769</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171983</URL>
        <Description>SUSE Bug 1171983</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.</Note>
    </Notes>
    <CVE>CVE-2020-12771</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-12771.html</URL>
        <Description>CVE-2020-12771</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171732</URL>
        <Description>SUSE Bug 1171732</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.</Note>
    </Notes>
    <CVE>CVE-2020-12888</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-12888.html</URL>
        <Description>CVE-2020-12888</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159281</URL>
        <Description>SUSE Bug 1159281</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171868</URL>
        <Description>SUSE Bug 1171868</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176979</URL>
        <Description>SUSE Bug 1176979</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179612</URL>
        <Description>SUSE Bug 1179612</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal '\0' value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.</Note>
    </Notes>
    <CVE>CVE-2020-13143</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-13143.html</URL>
        <Description>CVE-2020-13143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171982</URL>
        <Description>SUSE Bug 1171982</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.</Note>
    </Notes>
    <CVE>CVE-2020-13974</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-13974.html</URL>
        <Description>CVE-2020-13974</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172775</URL>
        <Description>SUSE Bug 1172775</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.</Note>
    </Notes>
    <CVE>CVE-2020-14314</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14314.html</URL>
        <Description>CVE-2020-14314</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173798</URL>
        <Description>SUSE Bug 1173798</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel's implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2020-14331</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14331.html</URL>
        <Description>CVE-2020-14331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174205</URL>
        <Description>SUSE Bug 1174205</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174247</URL>
        <Description>SUSE Bug 1174247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2020-14351</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14351.html</URL>
        <Description>CVE-2020-14351</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177086</URL>
        <Description>SUSE Bug 1177086</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.</Note>
    </Notes>
    <CVE>CVE-2020-14356</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14356.html</URL>
        <Description>CVE-2020-14356</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175213</URL>
        <Description>SUSE Bug 1175213</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176392</URL>
        <Description>SUSE Bug 1176392</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel before 5.9-rc4. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a denial of service. The highest threat from this vulnerability is to system availability.</Note>
    </Notes>
    <CVE>CVE-2020-14385</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14385.html</URL>
        <Description>CVE-2020-14385</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176137</URL>
        <Description>SUSE Bug 1176137</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.</Note>
    </Notes>
    <CVE>CVE-2020-14386</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14386.html</URL>
        <Description>CVE-2020-14386</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176069</URL>
        <Description>SUSE Bug 1176069</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176072</URL>
        <Description>SUSE Bug 1176072</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.</Note>
    </Notes>
    <CVE>CVE-2020-14390</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14390.html</URL>
        <Description>CVE-2020-14390</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176235</URL>
        <Description>SUSE Bug 1176235</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176253</URL>
        <Description>SUSE Bug 1176253</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176278</URL>
        <Description>SUSE Bug 1176278</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel before 5.4.16, a race condition in tty-&gt;disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.</Note>
    </Notes>
    <CVE>CVE-2020-14416</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14416.html</URL>
        <Description>CVE-2020-14416</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162002</URL>
        <Description>SUSE Bug 1162002</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.</Note>
    </Notes>
    <CVE>CVE-2020-15393</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15393.html</URL>
        <Description>CVE-2020-15393</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173514</URL>
        <Description>SUSE Bug 1173514</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.</Note>
    </Notes>
    <CVE>CVE-2020-15436</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15436.html</URL>
        <Description>CVE-2020-15436</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179141</URL>
        <Description>SUSE Bug 1179141</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p-&gt;serial_in pointer which uninitialized.</Note>
    </Notes>
    <CVE>CVE-2020-15437</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15437.html</URL>
        <Description>CVE-2020-15437</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179140</URL>
        <Description>SUSE Bug 1179140</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.</Note>
    </Notes>
    <CVE>CVE-2020-15780</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15780.html</URL>
        <Description>CVE-2020-15780</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173573</URL>
        <Description>SUSE Bug 1173573</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174186</URL>
        <Description>SUSE Bug 1174186</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef ("ovl: stack file ops"). This was fixed in kernel version 5.8 by commits 56230d9 ("ovl: verify permissions in ovl_path_open()"), 48bd024 ("ovl: switch to mounter creds in readdir") and 05acefb ("ovl: check permission to open real file"). Additionally, commits 130fdbc ("ovl: pass correct flags for opening real directory") and 292f902 ("ovl: call secutiry hook in ovl_real_ioctl()") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da ("ovl: do not fail because of O_NOATIMEi") in kernel 5.11.</Note>
    </Notes>
    <CVE>CVE-2020-16120</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-16120.html</URL>
        <Description>CVE-2020-16120</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177470</URL>
        <Description>SUSE Bug 1177470</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.</Note>
    </Notes>
    <CVE>CVE-2020-16166</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-16166.html</URL>
        <Description>CVE-2020-16166</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174757</URL>
        <Description>SUSE Bug 1174757</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel's implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.</Note>
    </Notes>
    <CVE>CVE-2020-1749</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-1749.html</URL>
        <Description>CVE-2020-1749</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165629</URL>
        <Description>SUSE Bug 1165629</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165631</URL>
        <Description>SUSE Bug 1165631</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177511</URL>
        <Description>SUSE Bug 1177511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177513</URL>
        <Description>SUSE Bug 1177513</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189302</URL>
        <Description>SUSE Bug 1189302</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.</Note>
    </Notes>
    <CVE>CVE-2020-24490</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-24490.html</URL>
        <Description>CVE-2020-24490</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177726</URL>
        <Description>SUSE Bug 1177726</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177727</URL>
        <Description>SUSE Bug 1177727</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.</Note>
    </Notes>
    <CVE>CVE-2020-25212</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25212.html</URL>
        <Description>CVE-2020-25212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176381</URL>
        <Description>SUSE Bug 1176381</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176382</URL>
        <Description>SUSE Bug 1176382</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177027</URL>
        <Description>SUSE Bug 1177027</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.</Note>
    </Notes>
    <CVE>CVE-2020-25284</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25284.html</URL>
        <Description>CVE-2020-25284</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176482</URL>
        <Description>SUSE Bug 1176482</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.</Note>
    </Notes>
    <CVE>CVE-2020-25285</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25285.html</URL>
        <Description>CVE-2020-25285</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176485</URL>
        <Description>SUSE Bug 1176485</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.</Note>
    </Notes>
    <CVE>CVE-2020-25641</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25641.html</URL>
        <Description>CVE-2020-25641</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177121</URL>
        <Description>SUSE Bug 1177121</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2020-25643</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25643.html</URL>
        <Description>CVE-2020-25643</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177206</URL>
        <Description>SUSE Bug 1177206</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177226</URL>
        <Description>SUSE Bug 1177226</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.</Note>
    </Notes>
    <CVE>CVE-2020-25645</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25645.html</URL>
        <Description>CVE-2020-25645</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177511</URL>
        <Description>SUSE Bug 1177511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177513</URL>
        <Description>SUSE Bug 1177513</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.</Note>
    </Notes>
    <CVE>CVE-2020-25656</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25656.html</URL>
        <Description>CVE-2020-25656</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177766</URL>
        <Description>SUSE Bug 1177766</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.</Note>
    </Notes>
    <CVE>CVE-2020-25668</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25668.html</URL>
        <Description>CVE-2020-25668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178123</URL>
        <Description>SUSE Bug 1178123</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178622</URL>
        <Description>SUSE Bug 1178622</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196914</URL>
        <Description>SUSE Bug 1196914</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="58">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.</Note>
    </Notes>
    <CVE>CVE-2020-25669</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25669.html</URL>
        <Description>CVE-2020-25669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178182</URL>
        <Description>SUSE Bug 1178182</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="59">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.</Note>
    </Notes>
    <CVE>CVE-2020-25704</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25704.html</URL>
        <Description>CVE-2020-25704</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178393</URL>
        <Description>SUSE Bug 1178393</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="60">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version</Note>
    </Notes>
    <CVE>CVE-2020-25705</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25705.html</URL>
        <Description>CVE-2020-25705</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175721</URL>
        <Description>SUSE Bug 1175721</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178782</URL>
        <Description>SUSE Bug 1178782</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178783</URL>
        <Description>SUSE Bug 1178783</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191790</URL>
        <Description>SUSE Bug 1191790</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="61">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.</Note>
    </Notes>
    <CVE>CVE-2020-26088</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-26088.html</URL>
        <Description>CVE-2020-26088</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176990</URL>
        <Description>SUSE Bug 1176990</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="62">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel</Note>
    </Notes>
    <CVE>CVE-2020-27068</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27068.html</URL>
        <Description>CVE-2020-27068</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180086</URL>
        <Description>SUSE Bug 1180086</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="63">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.</Note>
    </Notes>
    <CVE>CVE-2020-27777</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27777.html</URL>
        <Description>CVE-2020-27777</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179107</URL>
        <Description>SUSE Bug 1179107</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179419</URL>
        <Description>SUSE Bug 1179419</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200343</URL>
        <Description>SUSE Bug 1200343</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220060</URL>
        <Description>SUSE Bug 1220060</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="64">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel's implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2020-27786</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27786.html</URL>
        <Description>CVE-2020-27786</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179601</URL>
        <Description>SUSE Bug 1179601</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179616</URL>
        <Description>SUSE Bug 1179616</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="65">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.</Note>
    </Notes>
    <CVE>CVE-2020-27825</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27825.html</URL>
        <Description>CVE-2020-27825</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179960</URL>
        <Description>SUSE Bug 1179960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179961</URL>
        <Description>SUSE Bug 1179961</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="66">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.</Note>
    </Notes>
    <CVE>CVE-2020-27830</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27830.html</URL>
        <Description>CVE-2020-27830</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179656</URL>
        <Description>SUSE Bug 1179656</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="67">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.</Note>
    </Notes>
    <CVE>CVE-2020-28915</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-28915.html</URL>
        <Description>CVE-2020-28915</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178886</URL>
        <Description>SUSE Bug 1178886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="68">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in drivers/accessibility/speakup/spk_ttyio.c in the Linux kernel through 5.9.9. Local attackers on systems with the speakup driver could cause a local denial of service attack, aka CID-d41227544427. This occurs because of an invalid free when the line discipline is used more than once.</Note>
    </Notes>
    <CVE>CVE-2020-28941</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-28941.html</URL>
        <Description>CVE-2020-28941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178740</URL>
        <Description>SUSE Bug 1178740</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="69">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.</Note>
    </Notes>
    <CVE>CVE-2020-28974</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-28974.html</URL>
        <Description>CVE-2020-28974</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178589</URL>
        <Description>SUSE Bug 1178589</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="70">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.</Note>
    </Notes>
    <CVE>CVE-2020-29369</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29369.html</URL>
        <Description>CVE-2020-29369</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173504</URL>
        <Description>SUSE Bug 1173504</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179432</URL>
        <Description>SUSE Bug 1179432</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179646</URL>
        <Description>SUSE Bug 1179646</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182109</URL>
        <Description>SUSE Bug 1182109</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="71">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.</Note>
    </Notes>
    <CVE>CVE-2020-29370</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29370.html</URL>
        <Description>CVE-2020-29370</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179435</URL>
        <Description>SUSE Bug 1179435</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179648</URL>
        <Description>SUSE Bug 1179648</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="72">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.</Note>
    </Notes>
    <CVE>CVE-2020-29371</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29371.html</URL>
        <Description>CVE-2020-29371</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179429</URL>
        <Description>SUSE Bug 1179429</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="73">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d.</Note>
    </Notes>
    <CVE>CVE-2020-29373</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29373.html</URL>
        <Description>CVE-2020-29373</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179434</URL>
        <Description>SUSE Bug 1179434</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179779</URL>
        <Description>SUSE Bug 1179779</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="74">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.</Note>
    </Notes>
    <CVE>CVE-2020-29660</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29660.html</URL>
        <Description>CVE-2020-29660</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179745</URL>
        <Description>SUSE Bug 1179745</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179877</URL>
        <Description>SUSE Bug 1179877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="75">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.</Note>
    </Notes>
    <CVE>CVE-2020-29661</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29661.html</URL>
        <Description>CVE-2020-29661</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179745</URL>
        <Description>SUSE Bug 1179745</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179877</URL>
        <Description>SUSE Bug 1179877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214268</URL>
        <Description>SUSE Bug 1214268</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218966</URL>
        <Description>SUSE Bug 1218966</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="76">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.</Note>
    </Notes>
    <CVE>CVE-2020-36158</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-36158.html</URL>
        <Description>CVE-2020-36158</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180559</URL>
        <Description>SUSE Bug 1180559</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180562</URL>
        <Description>SUSE Bug 1180562</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="77">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.</Note>
    </Notes>
    <CVE>CVE-2020-4788</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-4788.html</URL>
        <Description>CVE-2020-4788</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177666</URL>
        <Description>SUSE Bug 1177666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181158</URL>
        <Description>SUSE Bug 1181158</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="78">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.</Note>
    </Notes>
    <CVE>CVE-2020-8694</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1</ProductID>
        <ProductID>openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-8694.html</URL>
        <Description>CVE-2020-8694</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1170415</URL>
        <Description>SUSE Bug 1170415</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1170446</URL>
        <Description>SUSE Bug 1170446</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178591</URL>
        <Description>SUSE Bug 1178591</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178700</URL>
        <Description>SUSE Bug 1178700</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179661</URL>
        <Description>SUSE Bug 1179661</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
