<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for xen</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2020:1886-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-07-10T13:49:48Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-07-10T13:49:48Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-07-10T13:49:48Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for xen</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for xen fixes the following issues:

- CVE-2020-15563: Fixed inverted code paths in x86 dirty VRAM tracking (bsc#1173377).
- CVE-2020-15565: Fixed insufficient cache write-back under VT-d (bsc#1173378).
- CVE-2020-15567: Fixed non-atomic modification of live EPT PTE (bsc#1173380).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">HPE-Helion-OpenStack-8-2020-1886,SUSE-2020-1886,SUSE-OpenStack-Cloud-8-2020-1886,SUSE-OpenStack-Cloud-Crowbar-8-2020-1886,SUSE-SLE-SAP-12-SP3-2020-1886,SUSE-SLE-SERVER-12-SP3-2020-1886,SUSE-SLE-SERVER-12-SP3-BCL-2020-1886,SUSE-Storage-5-2020-1886</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20201886-1/</URL>
      <Description>Link for SUSE-SU-2020:1886-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2020-July/007116.html</URL>
      <Description>E-Mail link for SUSE-SU-2020:1886-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173377</URL>
      <Description>SUSE Bug 1173377</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173378</URL>
      <Description>SUSE Bug 1173378</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173380</URL>
      <Description>SUSE Bug 1173380</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15563/</URL>
      <Description>SUSE CVE CVE-2020-15563 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15565/</URL>
      <Description>SUSE CVE CVE-2020-15565 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15567/</URL>
      <Description>SUSE CVE CVE-2020-15567 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="HPE Helion OpenStack 8">
      <Branch Type="Product Name" Name="HPE Helion OpenStack 8">
        <FullProductName ProductID="HPE Helion OpenStack 8" CPE="cpe:/o:suse:hpe-helion-openstack:8">HPE Helion OpenStack 8</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Enterprise Storage 5">
      <Branch Type="Product Name" Name="SUSE Enterprise Storage 5">
        <FullProductName ProductID="SUSE Enterprise Storage 5" CPE="cpe:/o:suse:ses:5">SUSE Enterprise Storage 5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP3-BCL">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP3-BCL">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3-BCL" CPE="cpe:/o:suse:sles-bcl:12:sp3">SUSE Linux Enterprise Server 12 SP3-BCL</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP3-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP3-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3-LTSS" CPE="cpe:/o:suse:sles-ltss:12:sp3">SUSE Linux Enterprise Server 12 SP3-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP3" CPE="cpe:/o:suse:sles_sap:12:sp3">SUSE Linux Enterprise Server for SAP Applications 12 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE OpenStack Cloud 8">
      <Branch Type="Product Name" Name="SUSE OpenStack Cloud 8">
        <FullProductName ProductID="SUSE OpenStack Cloud 8" CPE="cpe:/o:suse:suse-openstack-cloud:8">SUSE OpenStack Cloud 8</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE OpenStack Cloud Crowbar 8">
      <Branch Type="Product Name" Name="SUSE OpenStack Cloud Crowbar 8">
        <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 8" CPE="cpe:/o:suse:suse-openstack-cloud-crowbar:8">SUSE OpenStack Cloud Crowbar 8</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="xen-4.9.4_08-3.66.1">
      <FullProductName ProductID="xen-4.9.4_08-3.66.1">xen-4.9.4_08-3.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-doc-html-4.9.4_08-3.66.1">
      <FullProductName ProductID="xen-doc-html-4.9.4_08-3.66.1">xen-doc-html-4.9.4_08-3.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-4.9.4_08-3.66.1">
      <FullProductName ProductID="xen-libs-4.9.4_08-3.66.1">xen-libs-4.9.4_08-3.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-32bit-4.9.4_08-3.66.1">
      <FullProductName ProductID="xen-libs-32bit-4.9.4_08-3.66.1">xen-libs-32bit-4.9.4_08-3.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-4.9.4_08-3.66.1">
      <FullProductName ProductID="xen-tools-4.9.4_08-3.66.1">xen-tools-4.9.4_08-3.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-domU-4.9.4_08-3.66.1">
      <FullProductName ProductID="xen-tools-domU-4.9.4_08-3.66.1">xen-tools-domU-4.9.4_08-3.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-devel-4.9.4_08-3.66.1">
      <FullProductName ProductID="xen-devel-4.9.4_08-3.66.1">xen-devel-4.9.4_08-3.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-64bit-4.9.4_08-3.66.1">
      <FullProductName ProductID="xen-libs-64bit-4.9.4_08-3.66.1">xen-libs-64bit-4.9.4_08-3.66.1</FullProductName>
    </Branch>
    <Relationship ProductReference="xen-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="HPE Helion OpenStack 8">
      <FullProductName ProductID="HPE Helion OpenStack 8:xen-4.9.4_08-3.66.1">xen-4.9.4_08-3.66.1 as a component of HPE Helion OpenStack 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="HPE Helion OpenStack 8">
      <FullProductName ProductID="HPE Helion OpenStack 8:xen-doc-html-4.9.4_08-3.66.1">xen-doc-html-4.9.4_08-3.66.1 as a component of HPE Helion OpenStack 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="HPE Helion OpenStack 8">
      <FullProductName ProductID="HPE Helion OpenStack 8:xen-libs-4.9.4_08-3.66.1">xen-libs-4.9.4_08-3.66.1 as a component of HPE Helion OpenStack 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="HPE Helion OpenStack 8">
      <FullProductName ProductID="HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_08-3.66.1">xen-libs-32bit-4.9.4_08-3.66.1 as a component of HPE Helion OpenStack 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="HPE Helion OpenStack 8">
      <FullProductName ProductID="HPE Helion OpenStack 8:xen-tools-4.9.4_08-3.66.1">xen-tools-4.9.4_08-3.66.1 as a component of HPE Helion OpenStack 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="HPE Helion OpenStack 8">
      <FullProductName ProductID="HPE Helion OpenStack 8:xen-tools-domU-4.9.4_08-3.66.1">xen-tools-domU-4.9.4_08-3.66.1 as a component of HPE Helion OpenStack 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 5">
      <FullProductName ProductID="SUSE Enterprise Storage 5:xen-4.9.4_08-3.66.1">xen-4.9.4_08-3.66.1 as a component of SUSE Enterprise Storage 5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 5">
      <FullProductName ProductID="SUSE Enterprise Storage 5:xen-doc-html-4.9.4_08-3.66.1">xen-doc-html-4.9.4_08-3.66.1 as a component of SUSE Enterprise Storage 5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 5">
      <FullProductName ProductID="SUSE Enterprise Storage 5:xen-libs-4.9.4_08-3.66.1">xen-libs-4.9.4_08-3.66.1 as a component of SUSE Enterprise Storage 5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 5">
      <FullProductName ProductID="SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_08-3.66.1">xen-libs-32bit-4.9.4_08-3.66.1 as a component of SUSE Enterprise Storage 5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 5">
      <FullProductName ProductID="SUSE Enterprise Storage 5:xen-tools-4.9.4_08-3.66.1">xen-tools-4.9.4_08-3.66.1 as a component of SUSE Enterprise Storage 5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 5">
      <FullProductName ProductID="SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_08-3.66.1">xen-tools-domU-4.9.4_08-3.66.1 as a component of SUSE Enterprise Storage 5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP3-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_08-3.66.1">xen-4.9.4_08-3.66.1 as a component of SUSE Linux Enterprise Server 12 SP3-BCL</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP3-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_08-3.66.1">xen-doc-html-4.9.4_08-3.66.1 as a component of SUSE Linux Enterprise Server 12 SP3-BCL</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP3-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_08-3.66.1">xen-libs-4.9.4_08-3.66.1 as a component of SUSE Linux Enterprise Server 12 SP3-BCL</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP3-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_08-3.66.1">xen-libs-32bit-4.9.4_08-3.66.1 as a component of SUSE Linux Enterprise Server 12 SP3-BCL</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP3-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_08-3.66.1">xen-tools-4.9.4_08-3.66.1 as a component of SUSE Linux Enterprise Server 12 SP3-BCL</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP3-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_08-3.66.1">xen-tools-domU-4.9.4_08-3.66.1 as a component of SUSE Linux Enterprise Server 12 SP3-BCL</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_08-3.66.1">xen-4.9.4_08-3.66.1 as a component of SUSE Linux Enterprise Server 12 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_08-3.66.1">xen-doc-html-4.9.4_08-3.66.1 as a component of SUSE Linux Enterprise Server 12 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_08-3.66.1">xen-libs-4.9.4_08-3.66.1 as a component of SUSE Linux Enterprise Server 12 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_08-3.66.1">xen-libs-32bit-4.9.4_08-3.66.1 as a component of SUSE Linux Enterprise Server 12 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_08-3.66.1">xen-tools-4.9.4_08-3.66.1 as a component of SUSE Linux Enterprise Server 12 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_08-3.66.1">xen-tools-domU-4.9.4_08-3.66.1 as a component of SUSE Linux Enterprise Server 12 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_08-3.66.1">xen-4.9.4_08-3.66.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_08-3.66.1">xen-doc-html-4.9.4_08-3.66.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_08-3.66.1">xen-libs-4.9.4_08-3.66.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_08-3.66.1">xen-libs-32bit-4.9.4_08-3.66.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_08-3.66.1">xen-tools-4.9.4_08-3.66.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_08-3.66.1">xen-tools-domU-4.9.4_08-3.66.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 8">
      <FullProductName ProductID="SUSE OpenStack Cloud 8:xen-4.9.4_08-3.66.1">xen-4.9.4_08-3.66.1 as a component of SUSE OpenStack Cloud 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 8">
      <FullProductName ProductID="SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_08-3.66.1">xen-doc-html-4.9.4_08-3.66.1 as a component of SUSE OpenStack Cloud 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 8">
      <FullProductName ProductID="SUSE OpenStack Cloud 8:xen-libs-4.9.4_08-3.66.1">xen-libs-4.9.4_08-3.66.1 as a component of SUSE OpenStack Cloud 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 8">
      <FullProductName ProductID="SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_08-3.66.1">xen-libs-32bit-4.9.4_08-3.66.1 as a component of SUSE OpenStack Cloud 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 8">
      <FullProductName ProductID="SUSE OpenStack Cloud 8:xen-tools-4.9.4_08-3.66.1">xen-tools-4.9.4_08-3.66.1 as a component of SUSE OpenStack Cloud 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 8">
      <FullProductName ProductID="SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_08-3.66.1">xen-tools-domU-4.9.4_08-3.66.1 as a component of SUSE OpenStack Cloud 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud Crowbar 8">
      <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_08-3.66.1">xen-4.9.4_08-3.66.1 as a component of SUSE OpenStack Cloud Crowbar 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud Crowbar 8">
      <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_08-3.66.1">xen-doc-html-4.9.4_08-3.66.1 as a component of SUSE OpenStack Cloud Crowbar 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud Crowbar 8">
      <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_08-3.66.1">xen-libs-4.9.4_08-3.66.1 as a component of SUSE OpenStack Cloud Crowbar 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud Crowbar 8">
      <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_08-3.66.1">xen-libs-32bit-4.9.4_08-3.66.1 as a component of SUSE OpenStack Cloud Crowbar 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud Crowbar 8">
      <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_08-3.66.1">xen-tools-4.9.4_08-3.66.1 as a component of SUSE OpenStack Cloud Crowbar 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.9.4_08-3.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud Crowbar 8">
      <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_08-3.66.1">xen-tools-domU-4.9.4_08-3.66.1 as a component of SUSE OpenStack Cloud Crowbar 8</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests' dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to point at unmapped space. A malicious or buggy HVM guest may cause the hypervisor to crash, resulting in Denial of Service (DoS) affecting the entire host. Xen versions from 4.8 onwards are affected. Xen versions 4.7 and earlier are not affected. Only x86 systems are affected. Arm systems are not affected. Only x86 HVM guests using shadow paging can leverage the vulnerability. In addition, there needs to be an entity actively monitoring a guest's video frame buffer (typically for display purposes) in order for such a guest to be able to leverage the vulnerability. x86 PV guests, as well as x86 HVM guests using hardware assisted paging (HAP), cannot leverage the vulnerability.</Note>
    </Notes>
    <CVE>CVE-2020-15563</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>HPE Helion OpenStack 8:xen-4.9.4_08-3.66.1</ProductID>
        <ProductID>HPE Helion OpenStack 8:xen-doc-html-4.9.4_08-3.66.1</ProductID>
        <ProductID>HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_08-3.66.1</ProductID>
        <ProductID>HPE Helion OpenStack 8:xen-libs-4.9.4_08-3.66.1</ProductID>
        <ProductID>HPE Helion OpenStack 8:xen-tools-4.9.4_08-3.66.1</ProductID>
        <ProductID>HPE Helion OpenStack 8:xen-tools-domU-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Enterprise Storage 5:xen-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Enterprise Storage 5:xen-doc-html-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Enterprise Storage 5:xen-libs-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Enterprise Storage 5:xen-tools-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 8:xen-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 8:xen-libs-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 8:xen-tools-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_08-3.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20201886-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15563.html</URL>
        <Description>CVE-2020-15563</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173377</URL>
        <Description>SUSE Bug 1173377</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require flushing of both TLBs. Furthermore, IOMMUs may be non-coherent, and hence prior to flushing IOMMU TLBs, a CPU cache also needs writing back to memory after changes were made. Such writing back of cached data was missing in particular when splitting large page mappings into smaller granularity ones. A malicious guest may be able to retain read/write DMA access to frames returned to Xen's free pool, and later reused for another purpose. Host crashes (leading to a Denial of Service) and privilege escalation cannot be ruled out. Xen versions from at least 3.2 onwards are affected. Only x86 Intel systems are affected. x86 AMD as well as Arm systems are not affected. Only x86 HVM guests using hardware assisted paging (HAP), having a passed through PCI device assigned, and having page table sharing enabled can leverage the vulnerability. Note that page table sharing will be enabled (by default) only if Xen considers IOMMU and CPU large page size support compatible.</Note>
    </Notes>
    <CVE>CVE-2020-15565</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>HPE Helion OpenStack 8:xen-4.9.4_08-3.66.1</ProductID>
        <ProductID>HPE Helion OpenStack 8:xen-doc-html-4.9.4_08-3.66.1</ProductID>
        <ProductID>HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_08-3.66.1</ProductID>
        <ProductID>HPE Helion OpenStack 8:xen-libs-4.9.4_08-3.66.1</ProductID>
        <ProductID>HPE Helion OpenStack 8:xen-tools-4.9.4_08-3.66.1</ProductID>
        <ProductID>HPE Helion OpenStack 8:xen-tools-domU-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Enterprise Storage 5:xen-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Enterprise Storage 5:xen-doc-html-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Enterprise Storage 5:xen-libs-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Enterprise Storage 5:xen-tools-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 8:xen-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 8:xen-libs-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 8:xen-tools-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_08-3.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20201886-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15565.html</URL>
        <Description>CVE-2020-15565</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173378</URL>
        <Description>SUSE Bug 1173378</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of non-atomic bitfield writes. Depending on the compiler version and optimisation flags, Xen might expose a dangerous partially written PTE to the hardware, which an attacker might be able to race to exploit. A guest administrator or perhaps even an unprivileged guest user might be able to cause denial of service, data corruption, or privilege escalation. Only systems using Intel CPUs are vulnerable. Systems using AMD CPUs, and Arm systems, are not vulnerable. Only systems using nested paging (hap, aka nested paging, aka in this case Intel EPT) are vulnerable. Only HVM and PVH guests can exploit the vulnerability. The presence and scope of the vulnerability depends on the precise optimisations performed by the compiler used to build Xen. If the compiler generates (a) a single 64-bit write, or (b) a series of read-modify-write operations in the same order as the source code, the hypervisor is not vulnerable. For example, in one test build using GCC 8.3 with normal settings, the compiler generated multiple (unlocked) read-modify-write operations in source-code order, which did not constitute a vulnerability. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code-generation options). The source code clearly violates the C rules, and thus should be considered vulnerable.</Note>
    </Notes>
    <CVE>CVE-2020-15567</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>HPE Helion OpenStack 8:xen-4.9.4_08-3.66.1</ProductID>
        <ProductID>HPE Helion OpenStack 8:xen-doc-html-4.9.4_08-3.66.1</ProductID>
        <ProductID>HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_08-3.66.1</ProductID>
        <ProductID>HPE Helion OpenStack 8:xen-libs-4.9.4_08-3.66.1</ProductID>
        <ProductID>HPE Helion OpenStack 8:xen-tools-4.9.4_08-3.66.1</ProductID>
        <ProductID>HPE Helion OpenStack 8:xen-tools-domU-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Enterprise Storage 5:xen-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Enterprise Storage 5:xen-doc-html-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Enterprise Storage 5:xen-libs-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Enterprise Storage 5:xen-tools-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 8:xen-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 8:xen-libs-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 8:xen-tools-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_08-3.66.1</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_08-3.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20201886-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15567.html</URL>
        <Description>CVE-2020-15567</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173380</URL>
        <Description>SUSE Bug 1173380</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
