<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2021:14764-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-07-13T07:46:15Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-07-13T07:46:15Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-07-13T07:46:15Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-0512: Fixed a possible out of bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1187595)
- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)
- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)
- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861 bsc#1185863)
- CVE-2021-29154: Fixed an incorrect computation of branch displacements in the BPF JIT compilers, which could allow to execute arbitrary code within the kernel context. (bsc#1184391)
- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)
- CVE-2020-24586: Fixed a bug that, under the right circumstances, allows to inject arbitrary network packets and/or exfiltrate user data when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP. (bsc#1185859 bsc#1185863)
- CVE-2020-26139: Fixed a bug that allows an Access Point (AP) to forward EAPOL frames to other clients even though the sender has not yet successfully authenticated. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients. (bsc#1185863 bsc#1186062)
- CVE-2020-24587: Fixed a bug that allows an adversary to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed. (bsc#1185862 bsc#1185863)

The following non-security bugs were fixed:

- md: do not flush workqueue unconditionally in md_open (bsc#1184081).
- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).
- md: md_open returns -EBUSY when entering racing area (bsc#1184081).
- md: split mddev_find (bsc#1184081).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">slessp4-kernel-source-14764,slexsp3-kernel-source-14764</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114764-1/</URL>
      <Description>Link for SUSE-SU-2021:14764-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html</URL>
      <Description>E-Mail link for SUSE-SU-2021:14764-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184081</URL>
      <Description>SUSE Bug 1184081</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184391</URL>
      <Description>SUSE Bug 1184391</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184611</URL>
      <Description>SUSE Bug 1184611</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185859</URL>
      <Description>SUSE Bug 1185859</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185861</URL>
      <Description>SUSE Bug 1185861</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185862</URL>
      <Description>SUSE Bug 1185862</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185863</URL>
      <Description>SUSE Bug 1185863</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1186062</URL>
      <Description>SUSE Bug 1186062</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1187038</URL>
      <Description>SUSE Bug 1187038</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1187452</URL>
      <Description>SUSE Bug 1187452</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1187595</URL>
      <Description>SUSE Bug 1187595</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-24586/</URL>
      <Description>SUSE CVE CVE-2020-24586 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-24587/</URL>
      <Description>SUSE CVE CVE-2020-24587 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-24588/</URL>
      <Description>SUSE CVE CVE-2020-24588 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-26139/</URL>
      <Description>SUSE CVE CVE-2020-26139 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-36386/</URL>
      <Description>SUSE CVE CVE-2020-36386 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-0512/</URL>
      <Description>SUSE CVE CVE-2021-0512 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29154/</URL>
      <Description>SUSE CVE CVE-2021-29154 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-32399/</URL>
      <Description>SUSE CVE CVE-2021-32399 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-34693/</URL>
      <Description>SUSE CVE CVE-2021-34693 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP4-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS" CPE="cpe:/o:suse:suse_sles:11:sp4">SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-bigmem-3.0.101-108.129.1">
      <FullProductName ProductID="kernel-bigmem-3.0.101-108.129.1">kernel-bigmem-3.0.101-108.129.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-bigmem-base-3.0.101-108.129.1">
      <FullProductName ProductID="kernel-bigmem-base-3.0.101-108.129.1">kernel-bigmem-base-3.0.101-108.129.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-bigmem-devel-3.0.101-108.129.1">
      <FullProductName ProductID="kernel-bigmem-devel-3.0.101-108.129.1">kernel-bigmem-devel-3.0.101-108.129.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-3.0.101-108.129.1">
      <FullProductName ProductID="kernel-default-3.0.101-108.129.1">kernel-default-3.0.101-108.129.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-3.0.101-108.129.1">
      <FullProductName ProductID="kernel-default-base-3.0.101-108.129.1">kernel-default-base-3.0.101-108.129.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-3.0.101-108.129.1">
      <FullProductName ProductID="kernel-default-devel-3.0.101-108.129.1">kernel-default-devel-3.0.101-108.129.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-man-3.0.101-108.129.1">
      <FullProductName ProductID="kernel-default-man-3.0.101-108.129.1">kernel-default-man-3.0.101-108.129.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-3.0.101-108.129.1">
      <FullProductName ProductID="kernel-ec2-3.0.101-108.129.1">kernel-ec2-3.0.101-108.129.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-base-3.0.101-108.129.1">
      <FullProductName ProductID="kernel-ec2-base-3.0.101-108.129.1">kernel-ec2-base-3.0.101-108.129.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-devel-3.0.101-108.129.1">
      <FullProductName ProductID="kernel-ec2-devel-3.0.101-108.129.1">kernel-ec2-devel-3.0.101-108.129.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-3.0.101-108.129.1">
      <FullProductName ProductID="kernel-pae-3.0.101-108.129.1">kernel-pae-3.0.101-108.129.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-base-3.0.101-108.129.1">
      <FullProductName ProductID="kernel-pae-base-3.0.101-108.129.1">kernel-pae-base-3.0.101-108.129.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-devel-3.0.101-108.129.1">
      <FullProductName ProductID="kernel-pae-devel-3.0.101-108.129.1">kernel-pae-devel-3.0.101-108.129.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ppc64-3.0.101-108.129.1">
      <FullProductName ProductID="kernel-ppc64-3.0.101-108.129.1">kernel-ppc64-3.0.101-108.129.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ppc64-base-3.0.101-108.129.1">
      <FullProductName ProductID="kernel-ppc64-base-3.0.101-108.129.1">kernel-ppc64-base-3.0.101-108.129.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ppc64-devel-3.0.101-108.129.1">
      <FullProductName ProductID="kernel-ppc64-devel-3.0.101-108.129.1">kernel-ppc64-devel-3.0.101-108.129.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-3.0.101-108.129.1">
      <FullProductName ProductID="kernel-source-3.0.101-108.129.1">kernel-source-3.0.101-108.129.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-3.0.101-108.129.1">
      <FullProductName ProductID="kernel-syms-3.0.101-108.129.1">kernel-syms-3.0.101-108.129.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-3.0.101-108.129.1">
      <FullProductName ProductID="kernel-trace-3.0.101-108.129.1">kernel-trace-3.0.101-108.129.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-base-3.0.101-108.129.1">
      <FullProductName ProductID="kernel-trace-base-3.0.101-108.129.1">kernel-trace-base-3.0.101-108.129.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-devel-3.0.101-108.129.1">
      <FullProductName ProductID="kernel-trace-devel-3.0.101-108.129.1">kernel-trace-devel-3.0.101-108.129.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-3.0.101-108.129.1">
      <FullProductName ProductID="kernel-xen-3.0.101-108.129.1">kernel-xen-3.0.101-108.129.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-base-3.0.101-108.129.1">
      <FullProductName ProductID="kernel-xen-base-3.0.101-108.129.1">kernel-xen-base-3.0.101-108.129.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-devel-3.0.101-108.129.1">
      <FullProductName ProductID="kernel-xen-devel-3.0.101-108.129.1">kernel-xen-devel-3.0.101-108.129.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-bigmem-3.0.101-108.129.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1">kernel-bigmem-3.0.101-108.129.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-bigmem-base-3.0.101-108.129.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1">kernel-bigmem-base-3.0.101-108.129.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-bigmem-devel-3.0.101-108.129.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1">kernel-bigmem-devel-3.0.101-108.129.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-3.0.101-108.129.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1">kernel-default-3.0.101-108.129.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-3.0.101-108.129.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1">kernel-default-base-3.0.101-108.129.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-3.0.101-108.129.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1">kernel-default-devel-3.0.101-108.129.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-man-3.0.101-108.129.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1">kernel-default-man-3.0.101-108.129.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-3.0.101-108.129.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1">kernel-ec2-3.0.101-108.129.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-base-3.0.101-108.129.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1">kernel-ec2-base-3.0.101-108.129.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-devel-3.0.101-108.129.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1">kernel-ec2-devel-3.0.101-108.129.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-3.0.101-108.129.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1">kernel-pae-3.0.101-108.129.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-base-3.0.101-108.129.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1">kernel-pae-base-3.0.101-108.129.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-devel-3.0.101-108.129.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1">kernel-pae-devel-3.0.101-108.129.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ppc64-3.0.101-108.129.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1">kernel-ppc64-3.0.101-108.129.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ppc64-base-3.0.101-108.129.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1">kernel-ppc64-base-3.0.101-108.129.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ppc64-devel-3.0.101-108.129.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1">kernel-ppc64-devel-3.0.101-108.129.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-3.0.101-108.129.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1">kernel-source-3.0.101-108.129.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-3.0.101-108.129.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1">kernel-syms-3.0.101-108.129.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-trace-3.0.101-108.129.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1">kernel-trace-3.0.101-108.129.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-trace-base-3.0.101-108.129.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1">kernel-trace-base-3.0.101-108.129.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-trace-devel-3.0.101-108.129.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1">kernel-trace-devel-3.0.101-108.129.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-3.0.101-108.129.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1">kernel-xen-3.0.101-108.129.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-base-3.0.101-108.129.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1">kernel-xen-base-3.0.101-108.129.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-devel-3.0.101-108.129.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1">kernel-xen-devel-3.0.101-108.129.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.</Note>
    </Notes>
    <CVE>CVE-2020-24586</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114764-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-24586.html</URL>
        <Description>CVE-2020-24586</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185859</URL>
        <Description>SUSE Bug 1185859</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192868</URL>
        <Description>SUSE Bug 1192868</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.</Note>
    </Notes>
    <CVE>CVE-2020-24587</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.8</BaseScore>
        <Vector>AV:A/AC:H/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114764-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-24587.html</URL>
        <Description>CVE-2020-24587</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185859</URL>
        <Description>SUSE Bug 1185859</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185862</URL>
        <Description>SUSE Bug 1185862</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192868</URL>
        <Description>SUSE Bug 1192868</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.</Note>
    </Notes>
    <CVE>CVE-2020-24588</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114764-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-24588.html</URL>
        <Description>CVE-2020-24588</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185861</URL>
        <Description>SUSE Bug 1185861</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192868</URL>
        <Description>SUSE Bug 1192868</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199701</URL>
        <Description>SUSE Bug 1199701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.</Note>
    </Notes>
    <CVE>CVE-2020-26139</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114764-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-26139.html</URL>
        <Description>CVE-2020-26139</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1186062</URL>
        <Description>SUSE Bug 1186062</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192868</URL>
        <Description>SUSE Bug 1192868</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.</Note>
    </Notes>
    <CVE>CVE-2020-36386</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114764-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-36386.html</URL>
        <Description>CVE-2020-36386</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1187038</URL>
        <Description>SUSE Bug 1187038</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192868</URL>
        <Description>SUSE Bug 1192868</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel</Note>
    </Notes>
    <CVE>CVE-2021-0512</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114764-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-0512.html</URL>
        <Description>CVE-2021-0512</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1187595</URL>
        <Description>SUSE Bug 1187595</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1187597</URL>
        <Description>SUSE Bug 1187597</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.</Note>
    </Notes>
    <CVE>CVE-2021-29154</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114764-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29154.html</URL>
        <Description>CVE-2021-29154</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184391</URL>
        <Description>SUSE Bug 1184391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184710</URL>
        <Description>SUSE Bug 1184710</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1186408</URL>
        <Description>SUSE Bug 1186408</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.</Note>
    </Notes>
    <CVE>CVE-2021-32399</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114764-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-32399.html</URL>
        <Description>CVE-2021-32399</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184611</URL>
        <Description>SUSE Bug 1184611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185898</URL>
        <Description>SUSE Bug 1185898</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185899</URL>
        <Description>SUSE Bug 1185899</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196174</URL>
        <Description>SUSE Bug 1196174</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200084</URL>
        <Description>SUSE Bug 1200084</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201734</URL>
        <Description>SUSE Bug 1201734</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.</Note>
    </Notes>
    <CVE>CVE-2021-34693</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114764-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-34693.html</URL>
        <Description>CVE-2021-34693</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1187452</URL>
        <Description>SUSE Bug 1187452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192868</URL>
        <Description>SUSE Bug 1192868</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
