OPENSUSE-SU-2021:0242-1

Vulnerability from csaf_opensuse - Published: 2021-02-05 15:16 - Updated: 2021-02-05 15:16
Summary
Security update for RT kernel
Severity
Moderate
Notes
Title of the patch: Security update for RT kernel
Description of the patch: This update syncs the RT kernel from the SUSE Linux Enterprise 15-SP2 codestream. This update was imported from the SUSE:SLE-15-SP2:Update update project.
Patchnames: openSUSE-2021-242
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
https://www.suse.com/support/security/rating/ external
https://ftp.suse.com/pub/projects/security/csaf/o… self
https://lists.opensuse.org/archives/list/security… self
https://lists.opensuse.org/archives/list/security… self
https://bugzilla.suse.com/1034995 self
https://bugzilla.suse.com/1040855 self
https://bugzilla.suse.com/1043347 self
https://bugzilla.suse.com/1044120 self
https://bugzilla.suse.com/1044767 self
https://bugzilla.suse.com/1055014 self
https://bugzilla.suse.com/1055117 self
https://bugzilla.suse.com/1055186 self
https://bugzilla.suse.com/1058115 self
https://bugzilla.suse.com/1061843 self
https://bugzilla.suse.com/1065600 self
https://bugzilla.suse.com/1065729 self
https://bugzilla.suse.com/1066382 self
https://bugzilla.suse.com/1071995 self
https://bugzilla.suse.com/1077428 self
https://bugzilla.suse.com/1085030 self
https://bugzilla.suse.com/1094244 self
https://bugzilla.suse.com/1094840 self
https://bugzilla.suse.com/1109695 self
https://bugzilla.suse.com/1115431 self
https://bugzilla.suse.com/1120163 self
https://bugzilla.suse.com/1129923 self
https://bugzilla.suse.com/1133021 self
https://bugzilla.suse.com/1134760 self
https://bugzilla.suse.com/1136666 self
https://bugzilla.suse.com/1138374 self
https://bugzilla.suse.com/1139944 self
https://bugzilla.suse.com/1148868 self
https://bugzilla.suse.com/1149032 self
https://bugzilla.suse.com/1152148 self
https://bugzilla.suse.com/1152457 self
https://bugzilla.suse.com/1152472 self
https://bugzilla.suse.com/1152489 self
https://bugzilla.suse.com/1153274 self
https://bugzilla.suse.com/1154353 self
https://bugzilla.suse.com/1154488 self
https://bugzilla.suse.com/1154492 self
https://bugzilla.suse.com/1154824 self
https://bugzilla.suse.com/1155518 self
https://bugzilla.suse.com/1155798 self
https://bugzilla.suse.com/1156315 self
https://bugzilla.suse.com/1156395 self
https://bugzilla.suse.com/1157169 self
https://bugzilla.suse.com/1158050 self
https://bugzilla.suse.com/1158242 self
https://bugzilla.suse.com/1158265 self
https://bugzilla.suse.com/1158748 self
https://bugzilla.suse.com/1158765 self
https://bugzilla.suse.com/1158775 self
https://bugzilla.suse.com/1158983 self
https://bugzilla.suse.com/1159058 self
https://bugzilla.suse.com/1159781 self
https://bugzilla.suse.com/1159867 self
https://bugzilla.suse.com/1159886 self
https://bugzilla.suse.com/1160388 self
https://bugzilla.suse.com/1160634 self
https://bugzilla.suse.com/1160947 self
https://bugzilla.suse.com/1161099 self
https://bugzilla.suse.com/1161495 self
https://bugzilla.suse.com/1162002 self
https://bugzilla.suse.com/1162063 self
https://bugzilla.suse.com/1162209 self
https://bugzilla.suse.com/1162400 self
https://bugzilla.suse.com/1162702 self
https://bugzilla.suse.com/1163592 self
https://bugzilla.suse.com/1163727 self
https://bugzilla.suse.com/1164648 self
https://bugzilla.suse.com/1164777 self
https://bugzilla.suse.com/1164780 self
https://bugzilla.suse.com/1165211 self
https://bugzilla.suse.com/1165455 self
https://bugzilla.suse.com/1165629 self
https://bugzilla.suse.com/1165692 self
https://bugzilla.suse.com/1165933 self
https://bugzilla.suse.com/1165975 self
https://bugzilla.suse.com/1166146 self
https://bugzilla.suse.com/1166166 self
https://bugzilla.suse.com/1166340 self
https://bugzilla.suse.com/1166965 self
https://bugzilla.suse.com/1166985 self
https://bugzilla.suse.com/1167030 self
https://bugzilla.suse.com/1167104 self
https://bugzilla.suse.com/1167527 self
https://bugzilla.suse.com/1167651 self
https://bugzilla.suse.com/1167657 self
https://bugzilla.suse.com/1167773 self
https://bugzilla.suse.com/1167851 self
https://bugzilla.suse.com/1168230 self
https://bugzilla.suse.com/1168461 self
https://bugzilla.suse.com/1168468 self
https://bugzilla.suse.com/1168779 self
https://bugzilla.suse.com/1168838 self
https://bugzilla.suse.com/1168952 self
https://bugzilla.suse.com/1168959 self
https://bugzilla.suse.com/1169021 self
https://bugzilla.suse.com/1169094 self
https://bugzilla.suse.com/1169194 self
https://bugzilla.suse.com/1169263 self
https://bugzilla.suse.com/1169514 self
https://bugzilla.suse.com/1169681 self
https://bugzilla.suse.com/1169763 self
https://bugzilla.suse.com/1169771 self
https://bugzilla.suse.com/1169790 self
https://bugzilla.suse.com/1169795 self
https://bugzilla.suse.com/1170011 self
https://bugzilla.suse.com/1170139 self
https://bugzilla.suse.com/1170232 self
https://bugzilla.suse.com/1170284 self
https://bugzilla.suse.com/1170415 self
https://bugzilla.suse.com/1170442 self
https://bugzilla.suse.com/1170617 self
https://bugzilla.suse.com/1170621 self
https://bugzilla.suse.com/1170774 self
https://bugzilla.suse.com/1170879 self
https://bugzilla.suse.com/1170891 self
https://bugzilla.suse.com/1170895 self
https://bugzilla.suse.com/1171000 self
https://bugzilla.suse.com/1171068 self
https://bugzilla.suse.com/1171073 self
https://bugzilla.suse.com/1171078 self
https://bugzilla.suse.com/1171117 self
https://bugzilla.suse.com/1171150 self
https://bugzilla.suse.com/1171156 self
https://bugzilla.suse.com/1171189 self
https://bugzilla.suse.com/1171191 self
https://bugzilla.suse.com/1171218 self
https://bugzilla.suse.com/1171219 self
https://bugzilla.suse.com/1171220 self
https://bugzilla.suse.com/1171236 self
https://bugzilla.suse.com/1171242 self
https://bugzilla.suse.com/1171246 self
https://bugzilla.suse.com/1171285 self
https://bugzilla.suse.com/1171293 self
https://bugzilla.suse.com/1171374 self
https://bugzilla.suse.com/1171390 self
https://bugzilla.suse.com/1171391 self
https://bugzilla.suse.com/1171392 self
https://bugzilla.suse.com/1171417 self
https://bugzilla.suse.com/1171426 self
https://bugzilla.suse.com/1171507 self
https://bugzilla.suse.com/1171513 self
https://bugzilla.suse.com/1171514 self
https://bugzilla.suse.com/1171529 self
https://bugzilla.suse.com/1171530 self
https://bugzilla.suse.com/1171558 self
https://bugzilla.suse.com/1171634 self
https://bugzilla.suse.com/1171644 self
https://bugzilla.suse.com/1171662 self
https://bugzilla.suse.com/1171675 self
https://bugzilla.suse.com/1171688 self
https://bugzilla.suse.com/1171699 self
https://bugzilla.suse.com/1171709 self
https://bugzilla.suse.com/1171730 self
https://bugzilla.suse.com/1171732 self
https://bugzilla.suse.com/1171736 self
https://bugzilla.suse.com/1171739 self
https://bugzilla.suse.com/1171742 self
https://bugzilla.suse.com/1171743 self
https://bugzilla.suse.com/1171759 self
https://bugzilla.suse.com/1171773 self
https://bugzilla.suse.com/1171774 self
https://bugzilla.suse.com/1171775 self
https://bugzilla.suse.com/1171776 self
https://bugzilla.suse.com/1171777 self
https://bugzilla.suse.com/1171778 self
https://bugzilla.suse.com/1171779 self
https://bugzilla.suse.com/1171780 self
https://bugzilla.suse.com/1171781 self
https://bugzilla.suse.com/1171782 self
https://bugzilla.suse.com/1171783 self
https://bugzilla.suse.com/1171784 self
https://bugzilla.suse.com/1171785 self
https://bugzilla.suse.com/1171786 self
https://bugzilla.suse.com/1171787 self
https://bugzilla.suse.com/1171788 self
https://bugzilla.suse.com/1171789 self
https://bugzilla.suse.com/1171790 self
https://bugzilla.suse.com/1171791 self
https://bugzilla.suse.com/1171792 self
https://bugzilla.suse.com/1171793 self
https://bugzilla.suse.com/1171794 self
https://bugzilla.suse.com/1171795 self
https://bugzilla.suse.com/1171796 self
https://bugzilla.suse.com/1171797 self
https://bugzilla.suse.com/1171798 self
https://bugzilla.suse.com/1171799 self
https://bugzilla.suse.com/1171810 self
https://bugzilla.suse.com/1171827 self
https://bugzilla.suse.com/1171828 self
https://bugzilla.suse.com/1171832 self
https://bugzilla.suse.com/1171833 self
https://bugzilla.suse.com/1171834 self
https://bugzilla.suse.com/1171835 self
https://bugzilla.suse.com/1171839 self
https://bugzilla.suse.com/1171840 self
https://bugzilla.suse.com/1171841 self
https://bugzilla.suse.com/1171842 self
https://bugzilla.suse.com/1171843 self
https://bugzilla.suse.com/1171844 self
https://bugzilla.suse.com/1171849 self
https://bugzilla.suse.com/1171857 self
https://bugzilla.suse.com/1171868 self
https://bugzilla.suse.com/1171904 self
https://bugzilla.suse.com/1171915 self
https://bugzilla.suse.com/1171982 self
https://bugzilla.suse.com/1171983 self
https://bugzilla.suse.com/1171988 self
https://bugzilla.suse.com/1172017 self
https://bugzilla.suse.com/1172046 self
https://bugzilla.suse.com/1172061 self
https://bugzilla.suse.com/1172062 self
https://bugzilla.suse.com/1172063 self
https://bugzilla.suse.com/1172064 self
https://bugzilla.suse.com/1172065 self
https://bugzilla.suse.com/1172066 self
https://bugzilla.suse.com/1172067 self
https://bugzilla.suse.com/1172068 self
https://bugzilla.suse.com/1172069 self
https://bugzilla.suse.com/1172073 self
https://bugzilla.suse.com/1172086 self
https://bugzilla.suse.com/1172095 self
https://bugzilla.suse.com/1172108 self
https://bugzilla.suse.com/1172145 self
https://bugzilla.suse.com/1172169 self
https://bugzilla.suse.com/1172170 self
https://bugzilla.suse.com/1172197 self
https://bugzilla.suse.com/1172201 self
https://bugzilla.suse.com/1172208 self
https://bugzilla.suse.com/1172223 self
https://bugzilla.suse.com/1172247 self
https://bugzilla.suse.com/1172317 self
https://bugzilla.suse.com/1172342 self
https://bugzilla.suse.com/1172343 self
https://bugzilla.suse.com/1172344 self
https://bugzilla.suse.com/1172365 self
https://bugzilla.suse.com/1172366 self
https://bugzilla.suse.com/1172374 self
https://bugzilla.suse.com/1172391 self
https://bugzilla.suse.com/1172393 self
https://bugzilla.suse.com/1172394 self
https://bugzilla.suse.com/1172418 self
https://bugzilla.suse.com/1172419 self
https://bugzilla.suse.com/1172453 self
https://bugzilla.suse.com/1172458 self
https://bugzilla.suse.com/1172467 self
https://bugzilla.suse.com/1172484 self
https://bugzilla.suse.com/1172537 self
https://bugzilla.suse.com/1172543 self
https://bugzilla.suse.com/1172687 self
https://bugzilla.suse.com/1172719 self
https://bugzilla.suse.com/1172733 self
https://bugzilla.suse.com/1172739 self
https://bugzilla.suse.com/1172751 self
https://bugzilla.suse.com/1172757 self
https://bugzilla.suse.com/1172759 self
https://bugzilla.suse.com/1172775 self
https://bugzilla.suse.com/1172781 self
https://bugzilla.suse.com/1172782 self
https://bugzilla.suse.com/1172783 self
https://bugzilla.suse.com/1172814 self
https://bugzilla.suse.com/1172823 self
https://bugzilla.suse.com/1172841 self
https://bugzilla.suse.com/1172871 self
https://bugzilla.suse.com/1172873 self
https://bugzilla.suse.com/1172938 self
https://bugzilla.suse.com/1172939 self
https://bugzilla.suse.com/1172940 self
https://bugzilla.suse.com/1172956 self
https://bugzilla.suse.com/1172963 self
https://bugzilla.suse.com/1172983 self
https://bugzilla.suse.com/1172984 self
https://bugzilla.suse.com/1172985 self
https://bugzilla.suse.com/1172986 self
https://bugzilla.suse.com/1172987 self
https://bugzilla.suse.com/1172988 self
https://bugzilla.suse.com/1172989 self
https://bugzilla.suse.com/1172990 self
https://bugzilla.suse.com/1172999 self
https://bugzilla.suse.com/1173017 self
https://bugzilla.suse.com/1173068 self
https://bugzilla.suse.com/1173074 self
https://bugzilla.suse.com/1173085 self
https://bugzilla.suse.com/1173115 self
https://bugzilla.suse.com/1173139 self
https://bugzilla.suse.com/1173206 self
https://bugzilla.suse.com/1173267 self
https://bugzilla.suse.com/1173271 self
https://bugzilla.suse.com/1173280 self
https://bugzilla.suse.com/1173284 self
https://bugzilla.suse.com/1173428 self
https://bugzilla.suse.com/1173438 self
https://bugzilla.suse.com/1173461 self
https://bugzilla.suse.com/1173468 self
https://bugzilla.suse.com/1173485 self
https://bugzilla.suse.com/1173514 self
https://bugzilla.suse.com/1173552 self
https://bugzilla.suse.com/1173573 self
https://bugzilla.suse.com/1173625 self
https://bugzilla.suse.com/1173746 self
https://bugzilla.suse.com/1173776 self
https://bugzilla.suse.com/1173798 self
https://bugzilla.suse.com/1173813 self
https://bugzilla.suse.com/1173817 self
https://bugzilla.suse.com/1173818 self
https://bugzilla.suse.com/1173820 self
https://bugzilla.suse.com/1173822 self
https://bugzilla.suse.com/1173823 self
https://bugzilla.suse.com/1173824 self
https://bugzilla.suse.com/1173825 self
https://bugzilla.suse.com/1173826 self
https://bugzilla.suse.com/1173827 self
https://bugzilla.suse.com/1173828 self
https://bugzilla.suse.com/1173830 self
https://bugzilla.suse.com/1173831 self
https://bugzilla.suse.com/1173832 self
https://bugzilla.suse.com/1173833 self
https://bugzilla.suse.com/1173834 self
https://bugzilla.suse.com/1173836 self
https://bugzilla.suse.com/1173837 self
https://bugzilla.suse.com/1173838 self
https://bugzilla.suse.com/1173839 self
https://bugzilla.suse.com/1173841 self
https://bugzilla.suse.com/1173843 self
https://bugzilla.suse.com/1173844 self
https://bugzilla.suse.com/1173845 self
https://bugzilla.suse.com/1173847 self
https://bugzilla.suse.com/1173849 self
https://bugzilla.suse.com/1173860 self
https://bugzilla.suse.com/1173894 self
https://bugzilla.suse.com/1173941 self
https://bugzilla.suse.com/1173954 self
https://bugzilla.suse.com/1174002 self
https://bugzilla.suse.com/1174003 self
https://bugzilla.suse.com/1174018 self
https://bugzilla.suse.com/1174026 self
https://bugzilla.suse.com/1174029 self
https://bugzilla.suse.com/1174072 self
https://bugzilla.suse.com/1174098 self
https://bugzilla.suse.com/1174110 self
https://bugzilla.suse.com/1174111 self
https://bugzilla.suse.com/1174116 self
https://bugzilla.suse.com/1174126 self
https://bugzilla.suse.com/1174127 self
https://bugzilla.suse.com/1174128 self
https://bugzilla.suse.com/1174129 self
https://bugzilla.suse.com/1174146 self
https://bugzilla.suse.com/1174185 self
https://bugzilla.suse.com/1174205 self
https://bugzilla.suse.com/1174244 self
https://bugzilla.suse.com/1174263 self
https://bugzilla.suse.com/1174264 self
https://bugzilla.suse.com/1174331 self
https://bugzilla.suse.com/1174332 self
https://bugzilla.suse.com/1174333 self
https://bugzilla.suse.com/1174345 self
https://bugzilla.suse.com/1174356 self
https://bugzilla.suse.com/1174358 self
https://bugzilla.suse.com/1174362 self
https://bugzilla.suse.com/1174387 self
https://bugzilla.suse.com/1174396 self
https://bugzilla.suse.com/1174398 self
https://bugzilla.suse.com/1174407 self
https://bugzilla.suse.com/1174409 self
https://bugzilla.suse.com/1174411 self
https://bugzilla.suse.com/1174438 self
https://bugzilla.suse.com/1174462 self
https://bugzilla.suse.com/1174484 self
https://bugzilla.suse.com/1174486 self
https://bugzilla.suse.com/1174513 self
https://bugzilla.suse.com/1174527 self
https://bugzilla.suse.com/1174625 self
https://bugzilla.suse.com/1174627 self
https://bugzilla.suse.com/1174645 self
https://bugzilla.suse.com/1174689 self
https://bugzilla.suse.com/1174699 self
https://bugzilla.suse.com/1174737 self
https://bugzilla.suse.com/1174748 self
https://bugzilla.suse.com/1174757 self
https://bugzilla.suse.com/1174762 self
https://bugzilla.suse.com/1174770 self
https://bugzilla.suse.com/1174771 self
https://bugzilla.suse.com/1174777 self
https://bugzilla.suse.com/1174805 self
https://bugzilla.suse.com/1174824 self
https://bugzilla.suse.com/1174825 self
https://bugzilla.suse.com/1174852 self
https://bugzilla.suse.com/1174865 self
https://bugzilla.suse.com/1174880 self
https://bugzilla.suse.com/1174897 self
https://bugzilla.suse.com/1174899 self
https://bugzilla.suse.com/1174906 self
https://bugzilla.suse.com/1174969 self
https://bugzilla.suse.com/1175009 self
https://bugzilla.suse.com/1175010 self
https://bugzilla.suse.com/1175011 self
https://bugzilla.suse.com/1175012 self
https://bugzilla.suse.com/1175013 self
https://bugzilla.suse.com/1175014 self
https://bugzilla.suse.com/1175015 self
https://bugzilla.suse.com/1175016 self
https://bugzilla.suse.com/1175017 self
https://bugzilla.suse.com/1175018 self
https://bugzilla.suse.com/1175019 self
https://bugzilla.suse.com/1175020 self
https://bugzilla.suse.com/1175021 self
https://bugzilla.suse.com/1175052 self
https://bugzilla.suse.com/1175079 self
https://bugzilla.suse.com/1175112 self
https://bugzilla.suse.com/1175116 self
https://bugzilla.suse.com/1175128 self
https://bugzilla.suse.com/1175149 self
https://bugzilla.suse.com/1175175 self
https://bugzilla.suse.com/1175176 self
https://bugzilla.suse.com/1175180 self
https://bugzilla.suse.com/1175181 self
https://bugzilla.suse.com/1175182 self
https://bugzilla.suse.com/1175183 self
https://bugzilla.suse.com/1175184 self
https://bugzilla.suse.com/1175185 self
https://bugzilla.suse.com/1175186 self
https://bugzilla.suse.com/1175187 self
https://bugzilla.suse.com/1175188 self
https://bugzilla.suse.com/1175189 self
https://bugzilla.suse.com/1175190 self
https://bugzilla.suse.com/1175191 self
https://bugzilla.suse.com/1175192 self
https://bugzilla.suse.com/1175195 self
https://bugzilla.suse.com/1175199 self
https://bugzilla.suse.com/1175213 self
https://bugzilla.suse.com/1175232 self
https://bugzilla.suse.com/1175263 self
https://bugzilla.suse.com/1175284 self
https://bugzilla.suse.com/1175296 self
https://bugzilla.suse.com/1175306 self
https://bugzilla.suse.com/1175344 self
https://bugzilla.suse.com/1175345 self
https://bugzilla.suse.com/1175346 self
https://bugzilla.suse.com/1175347 self
https://bugzilla.suse.com/1175367 self
https://bugzilla.suse.com/1175377 self
https://bugzilla.suse.com/1175440 self
https://bugzilla.suse.com/1175480 self
https://bugzilla.suse.com/1175493 self
https://bugzilla.suse.com/1175546 self
https://bugzilla.suse.com/1175550 self
https://bugzilla.suse.com/1175599 self
https://bugzilla.suse.com/1175621 self
https://bugzilla.suse.com/1175654 self
https://bugzilla.suse.com/1175667 self
https://bugzilla.suse.com/1175691 self
https://bugzilla.suse.com/1175718 self
https://bugzilla.suse.com/1175721 self
https://bugzilla.suse.com/1175749 self
https://bugzilla.suse.com/1175768 self
https://bugzilla.suse.com/1175769 self
https://bugzilla.suse.com/1175770 self
https://bugzilla.suse.com/1175771 self
https://bugzilla.suse.com/1175772 self
https://bugzilla.suse.com/1175774 self
https://bugzilla.suse.com/1175775 self
https://bugzilla.suse.com/1175787 self
https://bugzilla.suse.com/1175807 self
https://bugzilla.suse.com/1175834 self
https://bugzilla.suse.com/1175873 self
https://bugzilla.suse.com/1175882 self
https://bugzilla.suse.com/1175898 self
https://bugzilla.suse.com/1175918 self
https://bugzilla.suse.com/1175952 self
https://bugzilla.suse.com/1175995 self
https://bugzilla.suse.com/1175996 self
https://bugzilla.suse.com/1175997 self
https://bugzilla.suse.com/1175998 self
https://bugzilla.suse.com/1175999 self
https://bugzilla.suse.com/1176000 self
https://bugzilla.suse.com/1176001 self
https://bugzilla.suse.com/1176019 self
https://bugzilla.suse.com/1176022 self
https://bugzilla.suse.com/1176038 self
https://bugzilla.suse.com/1176063 self
https://bugzilla.suse.com/1176069 self
https://bugzilla.suse.com/1176109 self
https://bugzilla.suse.com/1176137 self
https://bugzilla.suse.com/1176180 self
https://bugzilla.suse.com/1176200 self
https://bugzilla.suse.com/1176235 self
https://bugzilla.suse.com/1176236 self
https://bugzilla.suse.com/1176237 self
https://bugzilla.suse.com/1176242 self
https://bugzilla.suse.com/1176354 self
https://bugzilla.suse.com/1176357 self
https://bugzilla.suse.com/1176358 self
https://bugzilla.suse.com/1176359 self
https://bugzilla.suse.com/1176360 self
https://bugzilla.suse.com/1176361 self
https://bugzilla.suse.com/1176362 self
https://bugzilla.suse.com/1176363 self
https://bugzilla.suse.com/1176364 self
https://bugzilla.suse.com/1176365 self
https://bugzilla.suse.com/1176366 self
https://bugzilla.suse.com/1176367 self
https://bugzilla.suse.com/1176381 self
https://bugzilla.suse.com/1176396 self
https://bugzilla.suse.com/1176400 self
https://bugzilla.suse.com/1176423 self
https://bugzilla.suse.com/1176449 self
https://bugzilla.suse.com/1176481 self
https://bugzilla.suse.com/1176485 self
https://bugzilla.suse.com/1176486 self
https://bugzilla.suse.com/1176507 self
https://bugzilla.suse.com/1176536 self
https://bugzilla.suse.com/1176537 self
https://bugzilla.suse.com/1176538 self
https://bugzilla.suse.com/1176539 self
https://bugzilla.suse.com/1176540 self
https://bugzilla.suse.com/1176541 self
https://bugzilla.suse.com/1176542 self
https://bugzilla.suse.com/1176543 self
https://bugzilla.suse.com/1176544 self
https://bugzilla.suse.com/1176545 self
https://bugzilla.suse.com/1176546 self
https://bugzilla.suse.com/1176548 self
https://bugzilla.suse.com/1176558 self
https://bugzilla.suse.com/1176559 self
https://bugzilla.suse.com/1176564 self
https://bugzilla.suse.com/1176586 self
https://bugzilla.suse.com/1176587 self
https://bugzilla.suse.com/1176588 self
https://bugzilla.suse.com/1176659 self
https://bugzilla.suse.com/1176698 self
https://bugzilla.suse.com/1176699 self
https://bugzilla.suse.com/1176700 self
https://bugzilla.suse.com/1176713 self
https://bugzilla.suse.com/1176721 self
https://bugzilla.suse.com/1176722 self
https://bugzilla.suse.com/1176725 self
https://bugzilla.suse.com/1176732 self
https://bugzilla.suse.com/1176763 self
https://bugzilla.suse.com/1176775 self
https://bugzilla.suse.com/1176788 self
https://bugzilla.suse.com/1176789 self
https://bugzilla.suse.com/1176833 self
https://bugzilla.suse.com/1176855 self
https://bugzilla.suse.com/1176869 self
https://bugzilla.suse.com/1176877 self
https://bugzilla.suse.com/1176907 self
https://bugzilla.suse.com/1176925 self
https://bugzilla.suse.com/1176942 self
https://bugzilla.suse.com/1176956 self
https://bugzilla.suse.com/1176962 self
https://bugzilla.suse.com/1176979 self
https://bugzilla.suse.com/1176980 self
https://bugzilla.suse.com/1176983 self
https://bugzilla.suse.com/1176990 self
https://bugzilla.suse.com/1177021 self
https://bugzilla.suse.com/1177030 self
https://bugzilla.suse.com/1177066 self
https://bugzilla.suse.com/1177070 self
https://bugzilla.suse.com/1177086 self
https://bugzilla.suse.com/1177090 self
https://bugzilla.suse.com/1177109 self
https://bugzilla.suse.com/1177121 self
https://bugzilla.suse.com/1177193 self
https://bugzilla.suse.com/1177194 self
https://bugzilla.suse.com/1177206 self
https://bugzilla.suse.com/1177258 self
https://bugzilla.suse.com/1177271 self
https://bugzilla.suse.com/1177281 self
https://bugzilla.suse.com/1177283 self
https://bugzilla.suse.com/1177284 self
https://bugzilla.suse.com/1177285 self
https://bugzilla.suse.com/1177286 self
https://bugzilla.suse.com/1177297 self
https://bugzilla.suse.com/1177326 self
https://bugzilla.suse.com/1177353 self
https://bugzilla.suse.com/1177384 self
https://bugzilla.suse.com/1177397 self
https://bugzilla.suse.com/1177410 self
https://bugzilla.suse.com/1177411 self
https://bugzilla.suse.com/1177470 self
https://bugzilla.suse.com/1177500 self
https://bugzilla.suse.com/1177511 self
https://bugzilla.suse.com/1177617 self
https://bugzilla.suse.com/1177666 self
https://bugzilla.suse.com/1177679 self
https://bugzilla.suse.com/1177681 self
https://bugzilla.suse.com/1177683 self
https://bugzilla.suse.com/1177687 self
https://bugzilla.suse.com/1177694 self
https://bugzilla.suse.com/1177697 self
https://bugzilla.suse.com/1177698 self
https://bugzilla.suse.com/1177703 self
https://bugzilla.suse.com/1177719 self
https://bugzilla.suse.com/1177724 self
https://bugzilla.suse.com/1177725 self
https://bugzilla.suse.com/1177726 self
https://bugzilla.suse.com/1177733 self
https://bugzilla.suse.com/1177739 self
https://bugzilla.suse.com/1177749 self
https://bugzilla.suse.com/1177750 self
https://bugzilla.suse.com/1177754 self
https://bugzilla.suse.com/1177755 self
https://bugzilla.suse.com/1177765 self
https://bugzilla.suse.com/1177766 self
https://bugzilla.suse.com/1177799 self
https://bugzilla.suse.com/1177801 self
https://bugzilla.suse.com/1177814 self
https://bugzilla.suse.com/1177817 self
https://bugzilla.suse.com/1177820 self
https://bugzilla.suse.com/1177854 self
https://bugzilla.suse.com/1177855 self
https://bugzilla.suse.com/1177856 self
https://bugzilla.suse.com/1177861 self
https://bugzilla.suse.com/1178002 self
https://bugzilla.suse.com/1178049 self
https://bugzilla.suse.com/1178079 self
https://bugzilla.suse.com/1178123 self
https://bugzilla.suse.com/1178166 self
https://bugzilla.suse.com/1178173 self
https://bugzilla.suse.com/1178175 self
https://bugzilla.suse.com/1178176 self
https://bugzilla.suse.com/1178177 self
https://bugzilla.suse.com/1178182 self
https://bugzilla.suse.com/1178183 self
https://bugzilla.suse.com/1178184 self
https://bugzilla.suse.com/1178185 self
https://bugzilla.suse.com/1178186 self
https://bugzilla.suse.com/1178190 self
https://bugzilla.suse.com/1178191 self
https://bugzilla.suse.com/1178203 self
https://bugzilla.suse.com/1178227 self
https://bugzilla.suse.com/1178246 self
https://bugzilla.suse.com/1178255 self
https://bugzilla.suse.com/1178270 self
https://bugzilla.suse.com/1178286 self
https://bugzilla.suse.com/1178307 self
https://bugzilla.suse.com/1178330 self
https://bugzilla.suse.com/1178393 self
https://bugzilla.suse.com/1178395 self
https://bugzilla.suse.com/1178401 self
https://bugzilla.suse.com/1178426 self
https://bugzilla.suse.com/1178461 self
https://bugzilla.suse.com/1178579 self
https://bugzilla.suse.com/1178581 self
https://bugzilla.suse.com/1178584 self
https://bugzilla.suse.com/1178585 self
https://bugzilla.suse.com/1178589 self
https://bugzilla.suse.com/1178590 self
https://bugzilla.suse.com/1178612 self
https://bugzilla.suse.com/1178634 self
https://bugzilla.suse.com/1178635 self
https://bugzilla.suse.com/1178653 self
https://bugzilla.suse.com/1178659 self
https://bugzilla.suse.com/1178660 self
https://bugzilla.suse.com/1178661 self
https://bugzilla.suse.com/1178669 self
https://bugzilla.suse.com/1178686 self
https://bugzilla.suse.com/1178740 self
https://bugzilla.suse.com/1178755 self
https://bugzilla.suse.com/1178756 self
https://bugzilla.suse.com/1178762 self
https://bugzilla.suse.com/1178780 self
https://bugzilla.suse.com/1178838 self
https://bugzilla.suse.com/1178853 self
https://bugzilla.suse.com/1178886 self
https://bugzilla.suse.com/1179001 self
https://bugzilla.suse.com/1179012 self
https://bugzilla.suse.com/1179014 self
https://bugzilla.suse.com/1179015 self
https://bugzilla.suse.com/1179045 self
https://bugzilla.suse.com/1179076 self
https://bugzilla.suse.com/1179082 self
https://bugzilla.suse.com/1179107 self
https://bugzilla.suse.com/1179140 self
https://bugzilla.suse.com/1179141 self
https://bugzilla.suse.com/1179160 self
https://bugzilla.suse.com/1179201 self
https://bugzilla.suse.com/1179204 self
https://bugzilla.suse.com/1179211 self
https://bugzilla.suse.com/1179217 self
https://bugzilla.suse.com/1179419 self
https://bugzilla.suse.com/1179424 self
https://bugzilla.suse.com/1179425 self
https://bugzilla.suse.com/1179426 self
https://bugzilla.suse.com/1179427 self
https://bugzilla.suse.com/1179429 self
https://bugzilla.suse.com/1179432 self
https://bugzilla.suse.com/1179434 self
https://bugzilla.suse.com/1179435 self
https://bugzilla.suse.com/1179442 self
https://bugzilla.suse.com/1179519 self
https://bugzilla.suse.com/1179550 self
https://bugzilla.suse.com/1179575 self
https://bugzilla.suse.com/1179578 self
https://bugzilla.suse.com/1179601 self
https://bugzilla.suse.com/1179604 self
https://bugzilla.suse.com/1179639 self
https://bugzilla.suse.com/1179652 self
https://bugzilla.suse.com/1179656 self
https://bugzilla.suse.com/1179670 self
https://bugzilla.suse.com/1179671 self
https://bugzilla.suse.com/1179672 self
https://bugzilla.suse.com/1179673 self
https://bugzilla.suse.com/1179675 self
https://bugzilla.suse.com/1179676 self
https://bugzilla.suse.com/1179677 self
https://bugzilla.suse.com/1179678 self
https://bugzilla.suse.com/1179679 self
https://bugzilla.suse.com/1179680 self
https://bugzilla.suse.com/1179681 self
https://bugzilla.suse.com/1179682 self
https://bugzilla.suse.com/1179683 self
https://bugzilla.suse.com/1179684 self
https://bugzilla.suse.com/1179685 self
https://bugzilla.suse.com/1179687 self
https://bugzilla.suse.com/1179688 self
https://bugzilla.suse.com/1179689 self
https://bugzilla.suse.com/1179690 self
https://bugzilla.suse.com/1179703 self
https://bugzilla.suse.com/1179704 self
https://bugzilla.suse.com/1179707 self
https://bugzilla.suse.com/1179709 self
https://bugzilla.suse.com/1179710 self
https://bugzilla.suse.com/1179711 self
https://bugzilla.suse.com/1179712 self
https://bugzilla.suse.com/1179713 self
https://bugzilla.suse.com/1179714 self
https://bugzilla.suse.com/1179715 self
https://bugzilla.suse.com/1179716 self
https://bugzilla.suse.com/1179745 self
https://bugzilla.suse.com/1179763 self
https://bugzilla.suse.com/1179887 self
https://bugzilla.suse.com/1179888 self
https://bugzilla.suse.com/1179892 self
https://bugzilla.suse.com/1179896 self
https://bugzilla.suse.com/1179960 self
https://bugzilla.suse.com/1179963 self
https://bugzilla.suse.com/1180027 self
https://bugzilla.suse.com/1180029 self
https://bugzilla.suse.com/1180031 self
https://bugzilla.suse.com/1180052 self
https://bugzilla.suse.com/1180056 self
https://bugzilla.suse.com/1180086 self
https://bugzilla.suse.com/1180117 self
https://bugzilla.suse.com/1180258 self
https://bugzilla.suse.com/1180261 self
https://bugzilla.suse.com/1180349 self
https://bugzilla.suse.com/1180506 self
https://bugzilla.suse.com/1180541 self
https://bugzilla.suse.com/1180559 self
https://bugzilla.suse.com/1180566 self
https://bugzilla.suse.com/173030 self
https://bugzilla.suse.com/744692 self
https://bugzilla.suse.com/789311 self
https://bugzilla.suse.com/954532 self
https://bugzilla.suse.com/995541 self
https://www.suse.com/security/cve/CVE-2019-19462/ self
https://www.suse.com/security/cve/CVE-2019-20810/ self
https://www.suse.com/security/cve/CVE-2019-20812/ self
https://www.suse.com/security/cve/CVE-2020-0110/ self
https://www.suse.com/security/cve/CVE-2020-0305/ self
https://www.suse.com/security/cve/CVE-2020-0404/ self
https://www.suse.com/security/cve/CVE-2020-0427/ self
https://www.suse.com/security/cve/CVE-2020-0431/ self
https://www.suse.com/security/cve/CVE-2020-0432/ self
https://www.suse.com/security/cve/CVE-2020-0444/ self
https://www.suse.com/security/cve/CVE-2020-0465/ self
https://www.suse.com/security/cve/CVE-2020-0466/ self
https://www.suse.com/security/cve/CVE-2020-0543/ self
https://www.suse.com/security/cve/CVE-2020-10135/ self
https://www.suse.com/security/cve/CVE-2020-10711/ self
https://www.suse.com/security/cve/CVE-2020-10732/ self
https://www.suse.com/security/cve/CVE-2020-10751/ self
https://www.suse.com/security/cve/CVE-2020-10757/ self
https://www.suse.com/security/cve/CVE-2020-10766/ self
https://www.suse.com/security/cve/CVE-2020-10767/ self
https://www.suse.com/security/cve/CVE-2020-10768/ self
https://www.suse.com/security/cve/CVE-2020-10773/ self
https://www.suse.com/security/cve/CVE-2020-10781/ self
https://www.suse.com/security/cve/CVE-2020-11668/ self
https://www.suse.com/security/cve/CVE-2020-12351/ self
https://www.suse.com/security/cve/CVE-2020-12352/ self
https://www.suse.com/security/cve/CVE-2020-12652/ self
https://www.suse.com/security/cve/CVE-2020-12656/ self
https://www.suse.com/security/cve/CVE-2020-12769/ self
https://www.suse.com/security/cve/CVE-2020-12771/ self
https://www.suse.com/security/cve/CVE-2020-12888/ self
https://www.suse.com/security/cve/CVE-2020-13143/ self
https://www.suse.com/security/cve/CVE-2020-13974/ self
https://www.suse.com/security/cve/CVE-2020-14314/ self
https://www.suse.com/security/cve/CVE-2020-14331/ self
https://www.suse.com/security/cve/CVE-2020-14351/ self
https://www.suse.com/security/cve/CVE-2020-14356/ self
https://www.suse.com/security/cve/CVE-2020-14385/ self
https://www.suse.com/security/cve/CVE-2020-14386/ self
https://www.suse.com/security/cve/CVE-2020-14390/ self
https://www.suse.com/security/cve/CVE-2020-14416/ self
https://www.suse.com/security/cve/CVE-2020-15393/ self
https://www.suse.com/security/cve/CVE-2020-15436/ self
https://www.suse.com/security/cve/CVE-2020-15437/ self
https://www.suse.com/security/cve/CVE-2020-15780/ self
https://www.suse.com/security/cve/CVE-2020-16120/ self
https://www.suse.com/security/cve/CVE-2020-16166/ self
https://www.suse.com/security/cve/CVE-2020-1749/ self
https://www.suse.com/security/cve/CVE-2020-24490/ self
https://www.suse.com/security/cve/CVE-2020-25212/ self
https://www.suse.com/security/cve/CVE-2020-25284/ self
https://www.suse.com/security/cve/CVE-2020-25285/ self
https://www.suse.com/security/cve/CVE-2020-25641/ self
https://www.suse.com/security/cve/CVE-2020-25643/ self
https://www.suse.com/security/cve/CVE-2020-25645/ self
https://www.suse.com/security/cve/CVE-2020-25656/ self
https://www.suse.com/security/cve/CVE-2020-25668/ self
https://www.suse.com/security/cve/CVE-2020-25669/ self
https://www.suse.com/security/cve/CVE-2020-25704/ self
https://www.suse.com/security/cve/CVE-2020-25705/ self
https://www.suse.com/security/cve/CVE-2020-26088/ self
https://www.suse.com/security/cve/CVE-2020-27068/ self
https://www.suse.com/security/cve/CVE-2020-27777/ self
https://www.suse.com/security/cve/CVE-2020-27786/ self
https://www.suse.com/security/cve/CVE-2020-27825/ self
https://www.suse.com/security/cve/CVE-2020-27830/ self
https://www.suse.com/security/cve/CVE-2020-28915/ self
https://www.suse.com/security/cve/CVE-2020-28941/ self
https://www.suse.com/security/cve/CVE-2020-28974/ self
https://www.suse.com/security/cve/CVE-2020-29369/ self
https://www.suse.com/security/cve/CVE-2020-29370/ self
https://www.suse.com/security/cve/CVE-2020-29371/ self
https://www.suse.com/security/cve/CVE-2020-29373/ self
https://www.suse.com/security/cve/CVE-2020-29660/ self
https://www.suse.com/security/cve/CVE-2020-29661/ self
https://www.suse.com/security/cve/CVE-2020-36158/ self
https://www.suse.com/security/cve/CVE-2020-4788/ self
https://www.suse.com/security/cve/CVE-2020-8694/ self
https://www.suse.com/security/cve/CVE-2019-19462 external
https://bugzilla.suse.com/1158265 external
https://www.suse.com/security/cve/CVE-2019-20810 external
https://bugzilla.suse.com/1172458 external
https://www.suse.com/security/cve/CVE-2019-20812 external
https://bugzilla.suse.com/1172453 external
https://www.suse.com/security/cve/CVE-2020-0110 external
https://bugzilla.suse.com/1171374 external
https://bugzilla.suse.com/1174874 external
https://www.suse.com/security/cve/CVE-2020-0305 external
https://bugzilla.suse.com/1174462 external
https://www.suse.com/security/cve/CVE-2020-0404 external
https://bugzilla.suse.com/1176423 external
https://www.suse.com/security/cve/CVE-2020-0427 external
https://bugzilla.suse.com/1176725 external
https://www.suse.com/security/cve/CVE-2020-0431 external
https://bugzilla.suse.com/1176722 external
https://bugzilla.suse.com/1176896 external
https://www.suse.com/security/cve/CVE-2020-0432 external
https://bugzilla.suse.com/1176721 external
https://bugzilla.suse.com/1177165 external
https://www.suse.com/security/cve/CVE-2020-0444 external
https://bugzilla.suse.com/1180027 external
https://bugzilla.suse.com/1180028 external
https://www.suse.com/security/cve/CVE-2020-0465 external
https://bugzilla.suse.com/1180029 external
https://bugzilla.suse.com/1180030 external
https://www.suse.com/security/cve/CVE-2020-0466 external
https://bugzilla.suse.com/1180031 external
https://bugzilla.suse.com/1180032 external
https://bugzilla.suse.com/1199255 external
https://bugzilla.suse.com/1200084 external
https://www.suse.com/security/cve/CVE-2020-0543 external
https://bugzilla.suse.com/1154824 external
https://bugzilla.suse.com/1172205 external
https://bugzilla.suse.com/1172206 external
https://bugzilla.suse.com/1172207 external
https://bugzilla.suse.com/1172770 external
https://bugzilla.suse.com/1178658 external
https://bugzilla.suse.com/1201877 external
https://www.suse.com/security/cve/CVE-2020-10135 external
https://bugzilla.suse.com/1171988 external
https://www.suse.com/security/cve/CVE-2020-10711 external
https://bugzilla.suse.com/1171191 external
https://www.suse.com/security/cve/CVE-2020-10732 external
https://bugzilla.suse.com/1171220 external
https://www.suse.com/security/cve/CVE-2020-10751 external
https://bugzilla.suse.com/1171189 external
https://bugzilla.suse.com/1174963 external
https://www.suse.com/security/cve/CVE-2020-10757 external
https://bugzilla.suse.com/1159281 external
https://bugzilla.suse.com/1172317 external
https://bugzilla.suse.com/1172437 external
https://www.suse.com/security/cve/CVE-2020-10766 external
https://bugzilla.suse.com/1159281 external
https://bugzilla.suse.com/1172781 external
https://www.suse.com/security/cve/CVE-2020-10767 external
https://bugzilla.suse.com/1159281 external
https://bugzilla.suse.com/1172782 external
https://www.suse.com/security/cve/CVE-2020-10768 external
https://bugzilla.suse.com/1159281 external
https://bugzilla.suse.com/1172783 external
https://www.suse.com/security/cve/CVE-2020-10773 external
https://bugzilla.suse.com/1172999 external
https://www.suse.com/security/cve/CVE-2020-10781 external
https://bugzilla.suse.com/1173074 external
https://www.suse.com/security/cve/CVE-2020-11668 external
https://bugzilla.suse.com/1168952 external
https://bugzilla.suse.com/1173942 external
https://www.suse.com/security/cve/CVE-2020-12351 external
https://bugzilla.suse.com/1177724 external
https://bugzilla.suse.com/1177729 external
https://bugzilla.suse.com/1178397 external
https://www.suse.com/security/cve/CVE-2020-12352 external
https://bugzilla.suse.com/1177725 external
https://bugzilla.suse.com/1178398 external
https://www.suse.com/security/cve/CVE-2020-12652 external
https://bugzilla.suse.com/1171218 external
https://www.suse.com/security/cve/CVE-2020-12656 external
https://bugzilla.suse.com/1171219 external
https://www.suse.com/security/cve/CVE-2020-12769 external
https://bugzilla.suse.com/1171983 external
https://www.suse.com/security/cve/CVE-2020-12771 external
https://bugzilla.suse.com/1171732 external
https://www.suse.com/security/cve/CVE-2020-12888 external
https://bugzilla.suse.com/1159281 external
https://bugzilla.suse.com/1171868 external
https://bugzilla.suse.com/1176979 external
https://bugzilla.suse.com/1179612 external
https://www.suse.com/security/cve/CVE-2020-13143 external
https://bugzilla.suse.com/1171982 external
https://www.suse.com/security/cve/CVE-2020-13974 external
https://bugzilla.suse.com/1172775 external
https://www.suse.com/security/cve/CVE-2020-14314 external
https://bugzilla.suse.com/1173798 external
https://www.suse.com/security/cve/CVE-2020-14331 external
https://bugzilla.suse.com/1174205 external
https://bugzilla.suse.com/1174247 external
https://www.suse.com/security/cve/CVE-2020-14351 external
https://bugzilla.suse.com/1177086 external
https://www.suse.com/security/cve/CVE-2020-14356 external
https://bugzilla.suse.com/1175213 external
https://bugzilla.suse.com/1176392 external
https://www.suse.com/security/cve/CVE-2020-14385 external
https://bugzilla.suse.com/1176137 external
https://www.suse.com/security/cve/CVE-2020-14386 external
https://bugzilla.suse.com/1176069 external
https://bugzilla.suse.com/1176072 external
https://www.suse.com/security/cve/CVE-2020-14390 external
https://bugzilla.suse.com/1176235 external
https://bugzilla.suse.com/1176253 external
https://bugzilla.suse.com/1176278 external
https://www.suse.com/security/cve/CVE-2020-14416 external
https://bugzilla.suse.com/1162002 external
https://www.suse.com/security/cve/CVE-2020-15393 external
https://bugzilla.suse.com/1173514 external
https://www.suse.com/security/cve/CVE-2020-15436 external
https://bugzilla.suse.com/1179141 external
https://www.suse.com/security/cve/CVE-2020-15437 external
https://bugzilla.suse.com/1179140 external
https://www.suse.com/security/cve/CVE-2020-15780 external
https://bugzilla.suse.com/1173573 external
https://bugzilla.suse.com/1174186 external
https://www.suse.com/security/cve/CVE-2020-16120 external
https://bugzilla.suse.com/1177470 external
https://www.suse.com/security/cve/CVE-2020-16166 external
https://bugzilla.suse.com/1174757 external
https://www.suse.com/security/cve/CVE-2020-1749 external
https://bugzilla.suse.com/1165629 external
https://bugzilla.suse.com/1165631 external
https://bugzilla.suse.com/1177511 external
https://bugzilla.suse.com/1177513 external
https://bugzilla.suse.com/1189302 external
https://www.suse.com/security/cve/CVE-2020-24490 external
https://bugzilla.suse.com/1177726 external
https://bugzilla.suse.com/1177727 external
https://www.suse.com/security/cve/CVE-2020-25212 external
https://bugzilla.suse.com/1176381 external
https://bugzilla.suse.com/1176382 external
https://bugzilla.suse.com/1177027 external
https://www.suse.com/security/cve/CVE-2020-25284 external
https://bugzilla.suse.com/1176482 external
https://www.suse.com/security/cve/CVE-2020-25285 external
https://bugzilla.suse.com/1176485 external
https://www.suse.com/security/cve/CVE-2020-25641 external
https://bugzilla.suse.com/1177121 external
https://www.suse.com/security/cve/CVE-2020-25643 external
https://bugzilla.suse.com/1177206 external
https://bugzilla.suse.com/1177226 external
https://www.suse.com/security/cve/CVE-2020-25645 external
https://bugzilla.suse.com/1177511 external
https://bugzilla.suse.com/1177513 external
https://www.suse.com/security/cve/CVE-2020-25656 external
https://bugzilla.suse.com/1177766 external
https://www.suse.com/security/cve/CVE-2020-25668 external
https://bugzilla.suse.com/1178123 external
https://bugzilla.suse.com/1178622 external
https://bugzilla.suse.com/1196914 external
https://www.suse.com/security/cve/CVE-2020-25669 external
https://bugzilla.suse.com/1178182 external
https://www.suse.com/security/cve/CVE-2020-25704 external
https://bugzilla.suse.com/1178393 external
https://www.suse.com/security/cve/CVE-2020-25705 external
https://bugzilla.suse.com/1175721 external
https://bugzilla.suse.com/1178782 external
https://bugzilla.suse.com/1178783 external
https://bugzilla.suse.com/1191790 external
https://www.suse.com/security/cve/CVE-2020-26088 external
https://bugzilla.suse.com/1176990 external
https://www.suse.com/security/cve/CVE-2020-27068 external
https://bugzilla.suse.com/1180086 external
https://www.suse.com/security/cve/CVE-2020-27777 external
https://bugzilla.suse.com/1179107 external
https://bugzilla.suse.com/1179419 external
https://bugzilla.suse.com/1200343 external
https://bugzilla.suse.com/1220060 external
https://www.suse.com/security/cve/CVE-2020-27786 external
https://bugzilla.suse.com/1179601 external
https://bugzilla.suse.com/1179616 external
https://www.suse.com/security/cve/CVE-2020-27825 external
https://bugzilla.suse.com/1179960 external
https://bugzilla.suse.com/1179961 external
https://www.suse.com/security/cve/CVE-2020-27830 external
https://bugzilla.suse.com/1179656 external
https://www.suse.com/security/cve/CVE-2020-28915 external
https://bugzilla.suse.com/1178886 external
https://www.suse.com/security/cve/CVE-2020-28941 external
https://bugzilla.suse.com/1178740 external
https://www.suse.com/security/cve/CVE-2020-28974 external
https://bugzilla.suse.com/1178589 external
https://www.suse.com/security/cve/CVE-2020-29369 external
https://bugzilla.suse.com/1173504 external
https://bugzilla.suse.com/1179432 external
https://bugzilla.suse.com/1179646 external
https://bugzilla.suse.com/1182109 external
https://www.suse.com/security/cve/CVE-2020-29370 external
https://bugzilla.suse.com/1179435 external
https://bugzilla.suse.com/1179648 external
https://www.suse.com/security/cve/CVE-2020-29371 external
https://bugzilla.suse.com/1179429 external
https://www.suse.com/security/cve/CVE-2020-29373 external
https://bugzilla.suse.com/1179434 external
https://bugzilla.suse.com/1179779 external
https://www.suse.com/security/cve/CVE-2020-29660 external
https://bugzilla.suse.com/1179745 external
https://bugzilla.suse.com/1179877 external
https://www.suse.com/security/cve/CVE-2020-29661 external
https://bugzilla.suse.com/1179745 external
https://bugzilla.suse.com/1179877 external
https://bugzilla.suse.com/1214268 external
https://bugzilla.suse.com/1218966 external
https://www.suse.com/security/cve/CVE-2020-36158 external
https://bugzilla.suse.com/1180559 external
https://bugzilla.suse.com/1180562 external
https://www.suse.com/security/cve/CVE-2020-4788 external
https://bugzilla.suse.com/1177666 external
https://bugzilla.suse.com/1181158 external
https://www.suse.com/security/cve/CVE-2020-8694 external
https://bugzilla.suse.com/1170415 external
https://bugzilla.suse.com/1170446 external
https://bugzilla.suse.com/1178591 external
https://bugzilla.suse.com/1178700 external
https://bugzilla.suse.com/1179661 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for RT kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThis update syncs the RT kernel from the SUSE Linux Enterprise 15-SP2 codestream.\n  \nThis update was imported from the SUSE:SLE-15-SP2:Update update project.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-2021-242",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_0242-1.json"
      },
      {
        "category": "self",
        "summary": "URL for openSUSE-SU-2021:0242-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for openSUSE-SU-2021:0242-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1034995",
        "url": "https://bugzilla.suse.com/1034995"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1040855",
        "url": "https://bugzilla.suse.com/1040855"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1043347",
        "url": "https://bugzilla.suse.com/1043347"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1044120",
        "url": "https://bugzilla.suse.com/1044120"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1044767",
        "url": "https://bugzilla.suse.com/1044767"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1055014",
        "url": "https://bugzilla.suse.com/1055014"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1055117",
        "url": "https://bugzilla.suse.com/1055117"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1055186",
        "url": "https://bugzilla.suse.com/1055186"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1058115",
        "url": "https://bugzilla.suse.com/1058115"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1061843",
        "url": "https://bugzilla.suse.com/1061843"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065600",
        "url": "https://bugzilla.suse.com/1065600"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1066382",
        "url": "https://bugzilla.suse.com/1066382"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1071995",
        "url": "https://bugzilla.suse.com/1071995"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1077428",
        "url": "https://bugzilla.suse.com/1077428"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085030",
        "url": "https://bugzilla.suse.com/1085030"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1094244",
        "url": "https://bugzilla.suse.com/1094244"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1094840",
        "url": "https://bugzilla.suse.com/1094840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1109695",
        "url": "https://bugzilla.suse.com/1109695"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1115431",
        "url": "https://bugzilla.suse.com/1115431"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1120163",
        "url": "https://bugzilla.suse.com/1120163"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129923",
        "url": "https://bugzilla.suse.com/1129923"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133021",
        "url": "https://bugzilla.suse.com/1133021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1134760",
        "url": "https://bugzilla.suse.com/1134760"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1136666",
        "url": "https://bugzilla.suse.com/1136666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1138374",
        "url": "https://bugzilla.suse.com/1138374"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1139944",
        "url": "https://bugzilla.suse.com/1139944"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1148868",
        "url": "https://bugzilla.suse.com/1148868"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1149032",
        "url": "https://bugzilla.suse.com/1149032"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152148",
        "url": "https://bugzilla.suse.com/1152148"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152457",
        "url": "https://bugzilla.suse.com/1152457"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152472",
        "url": "https://bugzilla.suse.com/1152472"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152489",
        "url": "https://bugzilla.suse.com/1152489"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153274",
        "url": "https://bugzilla.suse.com/1153274"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154353",
        "url": "https://bugzilla.suse.com/1154353"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154488",
        "url": "https://bugzilla.suse.com/1154488"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154492",
        "url": "https://bugzilla.suse.com/1154492"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154824",
        "url": "https://bugzilla.suse.com/1154824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155518",
        "url": "https://bugzilla.suse.com/1155518"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155798",
        "url": "https://bugzilla.suse.com/1155798"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156315",
        "url": "https://bugzilla.suse.com/1156315"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156395",
        "url": "https://bugzilla.suse.com/1156395"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157169",
        "url": "https://bugzilla.suse.com/1157169"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158050",
        "url": "https://bugzilla.suse.com/1158050"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158242",
        "url": "https://bugzilla.suse.com/1158242"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158265",
        "url": "https://bugzilla.suse.com/1158265"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158748",
        "url": "https://bugzilla.suse.com/1158748"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158765",
        "url": "https://bugzilla.suse.com/1158765"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158775",
        "url": "https://bugzilla.suse.com/1158775"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158983",
        "url": "https://bugzilla.suse.com/1158983"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159058",
        "url": "https://bugzilla.suse.com/1159058"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159781",
        "url": "https://bugzilla.suse.com/1159781"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159867",
        "url": "https://bugzilla.suse.com/1159867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159886",
        "url": "https://bugzilla.suse.com/1159886"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160388",
        "url": "https://bugzilla.suse.com/1160388"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160634",
        "url": "https://bugzilla.suse.com/1160634"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160947",
        "url": "https://bugzilla.suse.com/1160947"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161099",
        "url": "https://bugzilla.suse.com/1161099"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161495",
        "url": "https://bugzilla.suse.com/1161495"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162002",
        "url": "https://bugzilla.suse.com/1162002"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162063",
        "url": "https://bugzilla.suse.com/1162063"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162209",
        "url": "https://bugzilla.suse.com/1162209"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162400",
        "url": "https://bugzilla.suse.com/1162400"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162702",
        "url": "https://bugzilla.suse.com/1162702"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163592",
        "url": "https://bugzilla.suse.com/1163592"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163727",
        "url": "https://bugzilla.suse.com/1163727"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164648",
        "url": "https://bugzilla.suse.com/1164648"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164777",
        "url": "https://bugzilla.suse.com/1164777"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164780",
        "url": "https://bugzilla.suse.com/1164780"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165211",
        "url": "https://bugzilla.suse.com/1165211"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165455",
        "url": "https://bugzilla.suse.com/1165455"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165629",
        "url": "https://bugzilla.suse.com/1165629"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165692",
        "url": "https://bugzilla.suse.com/1165692"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165933",
        "url": "https://bugzilla.suse.com/1165933"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165975",
        "url": "https://bugzilla.suse.com/1165975"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166146",
        "url": "https://bugzilla.suse.com/1166146"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166166",
        "url": "https://bugzilla.suse.com/1166166"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166340",
        "url": "https://bugzilla.suse.com/1166340"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166965",
        "url": "https://bugzilla.suse.com/1166965"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166985",
        "url": "https://bugzilla.suse.com/1166985"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1167030",
        "url": "https://bugzilla.suse.com/1167030"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1167104",
        "url": "https://bugzilla.suse.com/1167104"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1167527",
        "url": "https://bugzilla.suse.com/1167527"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1167651",
        "url": "https://bugzilla.suse.com/1167651"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1167657",
        "url": "https://bugzilla.suse.com/1167657"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1167773",
        "url": "https://bugzilla.suse.com/1167773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1167851",
        "url": "https://bugzilla.suse.com/1167851"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168230",
        "url": "https://bugzilla.suse.com/1168230"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168461",
        "url": "https://bugzilla.suse.com/1168461"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168468",
        "url": "https://bugzilla.suse.com/1168468"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168779",
        "url": "https://bugzilla.suse.com/1168779"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168838",
        "url": "https://bugzilla.suse.com/1168838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168952",
        "url": "https://bugzilla.suse.com/1168952"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168959",
        "url": "https://bugzilla.suse.com/1168959"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1169021",
        "url": "https://bugzilla.suse.com/1169021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1169094",
        "url": "https://bugzilla.suse.com/1169094"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1169194",
        "url": "https://bugzilla.suse.com/1169194"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1169263",
        "url": "https://bugzilla.suse.com/1169263"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1169514",
        "url": "https://bugzilla.suse.com/1169514"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1169681",
        "url": "https://bugzilla.suse.com/1169681"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1169763",
        "url": "https://bugzilla.suse.com/1169763"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1169771",
        "url": "https://bugzilla.suse.com/1169771"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1169790",
        "url": "https://bugzilla.suse.com/1169790"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1169795",
        "url": "https://bugzilla.suse.com/1169795"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170011",
        "url": "https://bugzilla.suse.com/1170011"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170139",
        "url": "https://bugzilla.suse.com/1170139"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170232",
        "url": "https://bugzilla.suse.com/1170232"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170284",
        "url": "https://bugzilla.suse.com/1170284"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170415",
        "url": "https://bugzilla.suse.com/1170415"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170442",
        "url": "https://bugzilla.suse.com/1170442"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170617",
        "url": "https://bugzilla.suse.com/1170617"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170621",
        "url": "https://bugzilla.suse.com/1170621"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170774",
        "url": "https://bugzilla.suse.com/1170774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170879",
        "url": "https://bugzilla.suse.com/1170879"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170891",
        "url": "https://bugzilla.suse.com/1170891"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170895",
        "url": "https://bugzilla.suse.com/1170895"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171000",
        "url": "https://bugzilla.suse.com/1171000"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171068",
        "url": "https://bugzilla.suse.com/1171068"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171073",
        "url": "https://bugzilla.suse.com/1171073"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171078",
        "url": "https://bugzilla.suse.com/1171078"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171117",
        "url": "https://bugzilla.suse.com/1171117"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171150",
        "url": "https://bugzilla.suse.com/1171150"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171156",
        "url": "https://bugzilla.suse.com/1171156"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171189",
        "url": "https://bugzilla.suse.com/1171189"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171191",
        "url": "https://bugzilla.suse.com/1171191"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171218",
        "url": "https://bugzilla.suse.com/1171218"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171219",
        "url": "https://bugzilla.suse.com/1171219"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171220",
        "url": "https://bugzilla.suse.com/1171220"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171236",
        "url": "https://bugzilla.suse.com/1171236"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171242",
        "url": "https://bugzilla.suse.com/1171242"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171246",
        "url": "https://bugzilla.suse.com/1171246"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171285",
        "url": "https://bugzilla.suse.com/1171285"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171293",
        "url": "https://bugzilla.suse.com/1171293"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171374",
        "url": "https://bugzilla.suse.com/1171374"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171390",
        "url": "https://bugzilla.suse.com/1171390"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171391",
        "url": "https://bugzilla.suse.com/1171391"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171392",
        "url": "https://bugzilla.suse.com/1171392"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171417",
        "url": "https://bugzilla.suse.com/1171417"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171426",
        "url": "https://bugzilla.suse.com/1171426"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171507",
        "url": "https://bugzilla.suse.com/1171507"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171513",
        "url": "https://bugzilla.suse.com/1171513"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171514",
        "url": "https://bugzilla.suse.com/1171514"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171529",
        "url": "https://bugzilla.suse.com/1171529"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171530",
        "url": "https://bugzilla.suse.com/1171530"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171558",
        "url": "https://bugzilla.suse.com/1171558"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171634",
        "url": "https://bugzilla.suse.com/1171634"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171644",
        "url": "https://bugzilla.suse.com/1171644"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171662",
        "url": "https://bugzilla.suse.com/1171662"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171675",
        "url": "https://bugzilla.suse.com/1171675"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171688",
        "url": "https://bugzilla.suse.com/1171688"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171699",
        "url": "https://bugzilla.suse.com/1171699"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171709",
        "url": "https://bugzilla.suse.com/1171709"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171730",
        "url": "https://bugzilla.suse.com/1171730"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171732",
        "url": "https://bugzilla.suse.com/1171732"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171736",
        "url": "https://bugzilla.suse.com/1171736"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171739",
        "url": "https://bugzilla.suse.com/1171739"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171742",
        "url": "https://bugzilla.suse.com/1171742"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171743",
        "url": "https://bugzilla.suse.com/1171743"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171759",
        "url": "https://bugzilla.suse.com/1171759"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171773",
        "url": "https://bugzilla.suse.com/1171773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171774",
        "url": "https://bugzilla.suse.com/1171774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171775",
        "url": "https://bugzilla.suse.com/1171775"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171776",
        "url": "https://bugzilla.suse.com/1171776"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171777",
        "url": "https://bugzilla.suse.com/1171777"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171778",
        "url": "https://bugzilla.suse.com/1171778"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171779",
        "url": "https://bugzilla.suse.com/1171779"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171780",
        "url": "https://bugzilla.suse.com/1171780"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171781",
        "url": "https://bugzilla.suse.com/1171781"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171782",
        "url": "https://bugzilla.suse.com/1171782"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171783",
        "url": "https://bugzilla.suse.com/1171783"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171784",
        "url": "https://bugzilla.suse.com/1171784"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171785",
        "url": "https://bugzilla.suse.com/1171785"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171786",
        "url": "https://bugzilla.suse.com/1171786"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171787",
        "url": "https://bugzilla.suse.com/1171787"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171788",
        "url": "https://bugzilla.suse.com/1171788"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171789",
        "url": "https://bugzilla.suse.com/1171789"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171790",
        "url": "https://bugzilla.suse.com/1171790"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171791",
        "url": "https://bugzilla.suse.com/1171791"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171792",
        "url": "https://bugzilla.suse.com/1171792"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171793",
        "url": "https://bugzilla.suse.com/1171793"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171794",
        "url": "https://bugzilla.suse.com/1171794"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171795",
        "url": "https://bugzilla.suse.com/1171795"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171796",
        "url": "https://bugzilla.suse.com/1171796"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171797",
        "url": "https://bugzilla.suse.com/1171797"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171798",
        "url": "https://bugzilla.suse.com/1171798"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171799",
        "url": "https://bugzilla.suse.com/1171799"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171810",
        "url": "https://bugzilla.suse.com/1171810"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171827",
        "url": "https://bugzilla.suse.com/1171827"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171828",
        "url": "https://bugzilla.suse.com/1171828"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171832",
        "url": "https://bugzilla.suse.com/1171832"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171833",
        "url": "https://bugzilla.suse.com/1171833"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171834",
        "url": "https://bugzilla.suse.com/1171834"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171835",
        "url": "https://bugzilla.suse.com/1171835"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171839",
        "url": "https://bugzilla.suse.com/1171839"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171840",
        "url": "https://bugzilla.suse.com/1171840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171841",
        "url": "https://bugzilla.suse.com/1171841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171842",
        "url": "https://bugzilla.suse.com/1171842"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171843",
        "url": "https://bugzilla.suse.com/1171843"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171844",
        "url": "https://bugzilla.suse.com/1171844"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171849",
        "url": "https://bugzilla.suse.com/1171849"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171857",
        "url": "https://bugzilla.suse.com/1171857"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171868",
        "url": "https://bugzilla.suse.com/1171868"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171904",
        "url": "https://bugzilla.suse.com/1171904"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171915",
        "url": "https://bugzilla.suse.com/1171915"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171982",
        "url": "https://bugzilla.suse.com/1171982"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171983",
        "url": "https://bugzilla.suse.com/1171983"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171988",
        "url": "https://bugzilla.suse.com/1171988"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172017",
        "url": "https://bugzilla.suse.com/1172017"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172046",
        "url": "https://bugzilla.suse.com/1172046"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172061",
        "url": "https://bugzilla.suse.com/1172061"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172062",
        "url": "https://bugzilla.suse.com/1172062"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172063",
        "url": "https://bugzilla.suse.com/1172063"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172064",
        "url": "https://bugzilla.suse.com/1172064"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172065",
        "url": "https://bugzilla.suse.com/1172065"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172066",
        "url": "https://bugzilla.suse.com/1172066"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172067",
        "url": "https://bugzilla.suse.com/1172067"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172068",
        "url": "https://bugzilla.suse.com/1172068"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172069",
        "url": "https://bugzilla.suse.com/1172069"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172073",
        "url": "https://bugzilla.suse.com/1172073"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172086",
        "url": "https://bugzilla.suse.com/1172086"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172095",
        "url": "https://bugzilla.suse.com/1172095"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172108",
        "url": "https://bugzilla.suse.com/1172108"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172145",
        "url": "https://bugzilla.suse.com/1172145"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172169",
        "url": "https://bugzilla.suse.com/1172169"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172170",
        "url": "https://bugzilla.suse.com/1172170"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172197",
        "url": "https://bugzilla.suse.com/1172197"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172201",
        "url": "https://bugzilla.suse.com/1172201"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172208",
        "url": "https://bugzilla.suse.com/1172208"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172223",
        "url": "https://bugzilla.suse.com/1172223"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172247",
        "url": "https://bugzilla.suse.com/1172247"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172317",
        "url": "https://bugzilla.suse.com/1172317"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172342",
        "url": "https://bugzilla.suse.com/1172342"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172343",
        "url": "https://bugzilla.suse.com/1172343"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172344",
        "url": "https://bugzilla.suse.com/1172344"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172365",
        "url": "https://bugzilla.suse.com/1172365"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172366",
        "url": "https://bugzilla.suse.com/1172366"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172374",
        "url": "https://bugzilla.suse.com/1172374"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172391",
        "url": "https://bugzilla.suse.com/1172391"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172393",
        "url": "https://bugzilla.suse.com/1172393"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172394",
        "url": "https://bugzilla.suse.com/1172394"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172418",
        "url": "https://bugzilla.suse.com/1172418"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172419",
        "url": "https://bugzilla.suse.com/1172419"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172453",
        "url": "https://bugzilla.suse.com/1172453"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172458",
        "url": "https://bugzilla.suse.com/1172458"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172467",
        "url": "https://bugzilla.suse.com/1172467"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172484",
        "url": "https://bugzilla.suse.com/1172484"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172537",
        "url": "https://bugzilla.suse.com/1172537"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172543",
        "url": "https://bugzilla.suse.com/1172543"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172687",
        "url": "https://bugzilla.suse.com/1172687"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172719",
        "url": "https://bugzilla.suse.com/1172719"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172733",
        "url": "https://bugzilla.suse.com/1172733"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172739",
        "url": "https://bugzilla.suse.com/1172739"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172751",
        "url": "https://bugzilla.suse.com/1172751"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172757",
        "url": "https://bugzilla.suse.com/1172757"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172759",
        "url": "https://bugzilla.suse.com/1172759"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172775",
        "url": "https://bugzilla.suse.com/1172775"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172781",
        "url": "https://bugzilla.suse.com/1172781"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172782",
        "url": "https://bugzilla.suse.com/1172782"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172783",
        "url": "https://bugzilla.suse.com/1172783"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172814",
        "url": "https://bugzilla.suse.com/1172814"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172823",
        "url": "https://bugzilla.suse.com/1172823"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172841",
        "url": "https://bugzilla.suse.com/1172841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172871",
        "url": "https://bugzilla.suse.com/1172871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172873",
        "url": "https://bugzilla.suse.com/1172873"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172938",
        "url": "https://bugzilla.suse.com/1172938"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172939",
        "url": "https://bugzilla.suse.com/1172939"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172940",
        "url": "https://bugzilla.suse.com/1172940"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172956",
        "url": "https://bugzilla.suse.com/1172956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172963",
        "url": "https://bugzilla.suse.com/1172963"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172983",
        "url": "https://bugzilla.suse.com/1172983"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172984",
        "url": "https://bugzilla.suse.com/1172984"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172985",
        "url": "https://bugzilla.suse.com/1172985"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172986",
        "url": "https://bugzilla.suse.com/1172986"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172987",
        "url": "https://bugzilla.suse.com/1172987"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172988",
        "url": "https://bugzilla.suse.com/1172988"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172989",
        "url": "https://bugzilla.suse.com/1172989"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172990",
        "url": "https://bugzilla.suse.com/1172990"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172999",
        "url": "https://bugzilla.suse.com/1172999"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173017",
        "url": "https://bugzilla.suse.com/1173017"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173068",
        "url": "https://bugzilla.suse.com/1173068"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173074",
        "url": "https://bugzilla.suse.com/1173074"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173085",
        "url": "https://bugzilla.suse.com/1173085"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173115",
        "url": "https://bugzilla.suse.com/1173115"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173139",
        "url": "https://bugzilla.suse.com/1173139"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173206",
        "url": "https://bugzilla.suse.com/1173206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173267",
        "url": "https://bugzilla.suse.com/1173267"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173271",
        "url": "https://bugzilla.suse.com/1173271"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173280",
        "url": "https://bugzilla.suse.com/1173280"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173284",
        "url": "https://bugzilla.suse.com/1173284"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173428",
        "url": "https://bugzilla.suse.com/1173428"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173438",
        "url": "https://bugzilla.suse.com/1173438"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173461",
        "url": "https://bugzilla.suse.com/1173461"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173468",
        "url": "https://bugzilla.suse.com/1173468"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173485",
        "url": "https://bugzilla.suse.com/1173485"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173514",
        "url": "https://bugzilla.suse.com/1173514"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173552",
        "url": "https://bugzilla.suse.com/1173552"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173573",
        "url": "https://bugzilla.suse.com/1173573"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173625",
        "url": "https://bugzilla.suse.com/1173625"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173746",
        "url": "https://bugzilla.suse.com/1173746"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173776",
        "url": "https://bugzilla.suse.com/1173776"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173798",
        "url": "https://bugzilla.suse.com/1173798"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173813",
        "url": "https://bugzilla.suse.com/1173813"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173817",
        "url": "https://bugzilla.suse.com/1173817"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173818",
        "url": "https://bugzilla.suse.com/1173818"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173820",
        "url": "https://bugzilla.suse.com/1173820"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173822",
        "url": "https://bugzilla.suse.com/1173822"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173823",
        "url": "https://bugzilla.suse.com/1173823"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173824",
        "url": "https://bugzilla.suse.com/1173824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173825",
        "url": "https://bugzilla.suse.com/1173825"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173826",
        "url": "https://bugzilla.suse.com/1173826"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173827",
        "url": "https://bugzilla.suse.com/1173827"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173828",
        "url": "https://bugzilla.suse.com/1173828"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173830",
        "url": "https://bugzilla.suse.com/1173830"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173831",
        "url": "https://bugzilla.suse.com/1173831"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173832",
        "url": "https://bugzilla.suse.com/1173832"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173833",
        "url": "https://bugzilla.suse.com/1173833"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173834",
        "url": "https://bugzilla.suse.com/1173834"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173836",
        "url": "https://bugzilla.suse.com/1173836"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173837",
        "url": "https://bugzilla.suse.com/1173837"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173838",
        "url": "https://bugzilla.suse.com/1173838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173839",
        "url": "https://bugzilla.suse.com/1173839"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173841",
        "url": "https://bugzilla.suse.com/1173841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173843",
        "url": "https://bugzilla.suse.com/1173843"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173844",
        "url": "https://bugzilla.suse.com/1173844"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173845",
        "url": "https://bugzilla.suse.com/1173845"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173847",
        "url": "https://bugzilla.suse.com/1173847"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173849",
        "url": "https://bugzilla.suse.com/1173849"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173860",
        "url": "https://bugzilla.suse.com/1173860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173894",
        "url": "https://bugzilla.suse.com/1173894"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173941",
        "url": "https://bugzilla.suse.com/1173941"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173954",
        "url": "https://bugzilla.suse.com/1173954"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174002",
        "url": "https://bugzilla.suse.com/1174002"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174003",
        "url": "https://bugzilla.suse.com/1174003"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174018",
        "url": "https://bugzilla.suse.com/1174018"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174026",
        "url": "https://bugzilla.suse.com/1174026"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174029",
        "url": "https://bugzilla.suse.com/1174029"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174072",
        "url": "https://bugzilla.suse.com/1174072"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174098",
        "url": "https://bugzilla.suse.com/1174098"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174110",
        "url": "https://bugzilla.suse.com/1174110"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174111",
        "url": "https://bugzilla.suse.com/1174111"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174116",
        "url": "https://bugzilla.suse.com/1174116"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174126",
        "url": "https://bugzilla.suse.com/1174126"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174127",
        "url": "https://bugzilla.suse.com/1174127"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174128",
        "url": "https://bugzilla.suse.com/1174128"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174129",
        "url": "https://bugzilla.suse.com/1174129"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174146",
        "url": "https://bugzilla.suse.com/1174146"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174185",
        "url": "https://bugzilla.suse.com/1174185"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174205",
        "url": "https://bugzilla.suse.com/1174205"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174244",
        "url": "https://bugzilla.suse.com/1174244"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174263",
        "url": "https://bugzilla.suse.com/1174263"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174264",
        "url": "https://bugzilla.suse.com/1174264"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174331",
        "url": "https://bugzilla.suse.com/1174331"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174332",
        "url": "https://bugzilla.suse.com/1174332"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174333",
        "url": "https://bugzilla.suse.com/1174333"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174345",
        "url": "https://bugzilla.suse.com/1174345"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174356",
        "url": "https://bugzilla.suse.com/1174356"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174358",
        "url": "https://bugzilla.suse.com/1174358"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174362",
        "url": "https://bugzilla.suse.com/1174362"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174387",
        "url": "https://bugzilla.suse.com/1174387"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174396",
        "url": "https://bugzilla.suse.com/1174396"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174398",
        "url": "https://bugzilla.suse.com/1174398"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174407",
        "url": "https://bugzilla.suse.com/1174407"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174409",
        "url": "https://bugzilla.suse.com/1174409"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174411",
        "url": "https://bugzilla.suse.com/1174411"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174438",
        "url": "https://bugzilla.suse.com/1174438"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174462",
        "url": "https://bugzilla.suse.com/1174462"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174484",
        "url": "https://bugzilla.suse.com/1174484"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174486",
        "url": "https://bugzilla.suse.com/1174486"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174513",
        "url": "https://bugzilla.suse.com/1174513"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174527",
        "url": "https://bugzilla.suse.com/1174527"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174625",
        "url": "https://bugzilla.suse.com/1174625"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174627",
        "url": "https://bugzilla.suse.com/1174627"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174645",
        "url": "https://bugzilla.suse.com/1174645"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174689",
        "url": "https://bugzilla.suse.com/1174689"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174699",
        "url": "https://bugzilla.suse.com/1174699"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174737",
        "url": "https://bugzilla.suse.com/1174737"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174748",
        "url": "https://bugzilla.suse.com/1174748"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174757",
        "url": "https://bugzilla.suse.com/1174757"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174762",
        "url": "https://bugzilla.suse.com/1174762"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174770",
        "url": "https://bugzilla.suse.com/1174770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174771",
        "url": "https://bugzilla.suse.com/1174771"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174777",
        "url": "https://bugzilla.suse.com/1174777"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174805",
        "url": "https://bugzilla.suse.com/1174805"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174824",
        "url": "https://bugzilla.suse.com/1174824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174825",
        "url": "https://bugzilla.suse.com/1174825"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174852",
        "url": "https://bugzilla.suse.com/1174852"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174865",
        "url": "https://bugzilla.suse.com/1174865"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174880",
        "url": "https://bugzilla.suse.com/1174880"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174897",
        "url": "https://bugzilla.suse.com/1174897"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174899",
        "url": "https://bugzilla.suse.com/1174899"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174906",
        "url": "https://bugzilla.suse.com/1174906"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174969",
        "url": "https://bugzilla.suse.com/1174969"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175009",
        "url": "https://bugzilla.suse.com/1175009"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175010",
        "url": "https://bugzilla.suse.com/1175010"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175011",
        "url": "https://bugzilla.suse.com/1175011"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175012",
        "url": "https://bugzilla.suse.com/1175012"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175013",
        "url": "https://bugzilla.suse.com/1175013"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175014",
        "url": "https://bugzilla.suse.com/1175014"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175015",
        "url": "https://bugzilla.suse.com/1175015"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175016",
        "url": "https://bugzilla.suse.com/1175016"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175017",
        "url": "https://bugzilla.suse.com/1175017"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175018",
        "url": "https://bugzilla.suse.com/1175018"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175019",
        "url": "https://bugzilla.suse.com/1175019"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175020",
        "url": "https://bugzilla.suse.com/1175020"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175021",
        "url": "https://bugzilla.suse.com/1175021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175052",
        "url": "https://bugzilla.suse.com/1175052"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175079",
        "url": "https://bugzilla.suse.com/1175079"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175112",
        "url": "https://bugzilla.suse.com/1175112"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175116",
        "url": "https://bugzilla.suse.com/1175116"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175128",
        "url": "https://bugzilla.suse.com/1175128"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175149",
        "url": "https://bugzilla.suse.com/1175149"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175175",
        "url": "https://bugzilla.suse.com/1175175"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175176",
        "url": "https://bugzilla.suse.com/1175176"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175180",
        "url": "https://bugzilla.suse.com/1175180"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175181",
        "url": "https://bugzilla.suse.com/1175181"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175182",
        "url": "https://bugzilla.suse.com/1175182"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175183",
        "url": "https://bugzilla.suse.com/1175183"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175184",
        "url": "https://bugzilla.suse.com/1175184"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175185",
        "url": "https://bugzilla.suse.com/1175185"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175186",
        "url": "https://bugzilla.suse.com/1175186"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175187",
        "url": "https://bugzilla.suse.com/1175187"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175188",
        "url": "https://bugzilla.suse.com/1175188"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175189",
        "url": "https://bugzilla.suse.com/1175189"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175190",
        "url": "https://bugzilla.suse.com/1175190"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175191",
        "url": "https://bugzilla.suse.com/1175191"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175192",
        "url": "https://bugzilla.suse.com/1175192"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175195",
        "url": "https://bugzilla.suse.com/1175195"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175199",
        "url": "https://bugzilla.suse.com/1175199"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175213",
        "url": "https://bugzilla.suse.com/1175213"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175232",
        "url": "https://bugzilla.suse.com/1175232"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175263",
        "url": "https://bugzilla.suse.com/1175263"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175284",
        "url": "https://bugzilla.suse.com/1175284"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175296",
        "url": "https://bugzilla.suse.com/1175296"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175306",
        "url": "https://bugzilla.suse.com/1175306"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175344",
        "url": "https://bugzilla.suse.com/1175344"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175345",
        "url": "https://bugzilla.suse.com/1175345"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175346",
        "url": "https://bugzilla.suse.com/1175346"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175347",
        "url": "https://bugzilla.suse.com/1175347"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175367",
        "url": "https://bugzilla.suse.com/1175367"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175377",
        "url": "https://bugzilla.suse.com/1175377"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175440",
        "url": "https://bugzilla.suse.com/1175440"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175480",
        "url": "https://bugzilla.suse.com/1175480"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175493",
        "url": "https://bugzilla.suse.com/1175493"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175546",
        "url": "https://bugzilla.suse.com/1175546"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175550",
        "url": "https://bugzilla.suse.com/1175550"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175599",
        "url": "https://bugzilla.suse.com/1175599"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175621",
        "url": "https://bugzilla.suse.com/1175621"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175654",
        "url": "https://bugzilla.suse.com/1175654"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175667",
        "url": "https://bugzilla.suse.com/1175667"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175691",
        "url": "https://bugzilla.suse.com/1175691"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175718",
        "url": "https://bugzilla.suse.com/1175718"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175721",
        "url": "https://bugzilla.suse.com/1175721"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175749",
        "url": "https://bugzilla.suse.com/1175749"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175768",
        "url": "https://bugzilla.suse.com/1175768"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175769",
        "url": "https://bugzilla.suse.com/1175769"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175770",
        "url": "https://bugzilla.suse.com/1175770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175771",
        "url": "https://bugzilla.suse.com/1175771"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175772",
        "url": "https://bugzilla.suse.com/1175772"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175774",
        "url": "https://bugzilla.suse.com/1175774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175775",
        "url": "https://bugzilla.suse.com/1175775"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175787",
        "url": "https://bugzilla.suse.com/1175787"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175807",
        "url": "https://bugzilla.suse.com/1175807"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175834",
        "url": "https://bugzilla.suse.com/1175834"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175873",
        "url": "https://bugzilla.suse.com/1175873"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175882",
        "url": "https://bugzilla.suse.com/1175882"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175898",
        "url": "https://bugzilla.suse.com/1175898"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175918",
        "url": "https://bugzilla.suse.com/1175918"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175952",
        "url": "https://bugzilla.suse.com/1175952"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175995",
        "url": "https://bugzilla.suse.com/1175995"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175996",
        "url": "https://bugzilla.suse.com/1175996"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175997",
        "url": "https://bugzilla.suse.com/1175997"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175998",
        "url": "https://bugzilla.suse.com/1175998"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175999",
        "url": "https://bugzilla.suse.com/1175999"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176000",
        "url": "https://bugzilla.suse.com/1176000"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176001",
        "url": "https://bugzilla.suse.com/1176001"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176019",
        "url": "https://bugzilla.suse.com/1176019"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176022",
        "url": "https://bugzilla.suse.com/1176022"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176038",
        "url": "https://bugzilla.suse.com/1176038"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176063",
        "url": "https://bugzilla.suse.com/1176063"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176069",
        "url": "https://bugzilla.suse.com/1176069"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176109",
        "url": "https://bugzilla.suse.com/1176109"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176137",
        "url": "https://bugzilla.suse.com/1176137"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176180",
        "url": "https://bugzilla.suse.com/1176180"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176200",
        "url": "https://bugzilla.suse.com/1176200"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176235",
        "url": "https://bugzilla.suse.com/1176235"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176236",
        "url": "https://bugzilla.suse.com/1176236"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176237",
        "url": "https://bugzilla.suse.com/1176237"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176242",
        "url": "https://bugzilla.suse.com/1176242"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176354",
        "url": "https://bugzilla.suse.com/1176354"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176357",
        "url": "https://bugzilla.suse.com/1176357"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176358",
        "url": "https://bugzilla.suse.com/1176358"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176359",
        "url": "https://bugzilla.suse.com/1176359"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176360",
        "url": "https://bugzilla.suse.com/1176360"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176361",
        "url": "https://bugzilla.suse.com/1176361"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176362",
        "url": "https://bugzilla.suse.com/1176362"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176363",
        "url": "https://bugzilla.suse.com/1176363"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176364",
        "url": "https://bugzilla.suse.com/1176364"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176365",
        "url": "https://bugzilla.suse.com/1176365"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176366",
        "url": "https://bugzilla.suse.com/1176366"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176367",
        "url": "https://bugzilla.suse.com/1176367"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176381",
        "url": "https://bugzilla.suse.com/1176381"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176396",
        "url": "https://bugzilla.suse.com/1176396"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176400",
        "url": "https://bugzilla.suse.com/1176400"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176423",
        "url": "https://bugzilla.suse.com/1176423"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176449",
        "url": "https://bugzilla.suse.com/1176449"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176481",
        "url": "https://bugzilla.suse.com/1176481"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176485",
        "url": "https://bugzilla.suse.com/1176485"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176486",
        "url": "https://bugzilla.suse.com/1176486"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176507",
        "url": "https://bugzilla.suse.com/1176507"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176536",
        "url": "https://bugzilla.suse.com/1176536"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176537",
        "url": "https://bugzilla.suse.com/1176537"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176538",
        "url": "https://bugzilla.suse.com/1176538"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176539",
        "url": "https://bugzilla.suse.com/1176539"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176540",
        "url": "https://bugzilla.suse.com/1176540"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176541",
        "url": "https://bugzilla.suse.com/1176541"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176542",
        "url": "https://bugzilla.suse.com/1176542"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176543",
        "url": "https://bugzilla.suse.com/1176543"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176544",
        "url": "https://bugzilla.suse.com/1176544"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176545",
        "url": "https://bugzilla.suse.com/1176545"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176546",
        "url": "https://bugzilla.suse.com/1176546"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176548",
        "url": "https://bugzilla.suse.com/1176548"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176558",
        "url": "https://bugzilla.suse.com/1176558"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176559",
        "url": "https://bugzilla.suse.com/1176559"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176564",
        "url": "https://bugzilla.suse.com/1176564"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176586",
        "url": "https://bugzilla.suse.com/1176586"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176587",
        "url": "https://bugzilla.suse.com/1176587"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176588",
        "url": "https://bugzilla.suse.com/1176588"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176659",
        "url": "https://bugzilla.suse.com/1176659"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176698",
        "url": "https://bugzilla.suse.com/1176698"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176699",
        "url": "https://bugzilla.suse.com/1176699"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176700",
        "url": "https://bugzilla.suse.com/1176700"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176713",
        "url": "https://bugzilla.suse.com/1176713"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176721",
        "url": "https://bugzilla.suse.com/1176721"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176722",
        "url": "https://bugzilla.suse.com/1176722"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176725",
        "url": "https://bugzilla.suse.com/1176725"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176732",
        "url": "https://bugzilla.suse.com/1176732"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176763",
        "url": "https://bugzilla.suse.com/1176763"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176775",
        "url": "https://bugzilla.suse.com/1176775"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176788",
        "url": "https://bugzilla.suse.com/1176788"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176789",
        "url": "https://bugzilla.suse.com/1176789"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176833",
        "url": "https://bugzilla.suse.com/1176833"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176855",
        "url": "https://bugzilla.suse.com/1176855"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176869",
        "url": "https://bugzilla.suse.com/1176869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176877",
        "url": "https://bugzilla.suse.com/1176877"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176907",
        "url": "https://bugzilla.suse.com/1176907"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176925",
        "url": "https://bugzilla.suse.com/1176925"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176942",
        "url": "https://bugzilla.suse.com/1176942"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176956",
        "url": "https://bugzilla.suse.com/1176956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176962",
        "url": "https://bugzilla.suse.com/1176962"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176979",
        "url": "https://bugzilla.suse.com/1176979"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176980",
        "url": "https://bugzilla.suse.com/1176980"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176983",
        "url": "https://bugzilla.suse.com/1176983"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176990",
        "url": "https://bugzilla.suse.com/1176990"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177021",
        "url": "https://bugzilla.suse.com/1177021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177030",
        "url": "https://bugzilla.suse.com/1177030"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177066",
        "url": "https://bugzilla.suse.com/1177066"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177070",
        "url": "https://bugzilla.suse.com/1177070"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177086",
        "url": "https://bugzilla.suse.com/1177086"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177090",
        "url": "https://bugzilla.suse.com/1177090"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177109",
        "url": "https://bugzilla.suse.com/1177109"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177121",
        "url": "https://bugzilla.suse.com/1177121"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177193",
        "url": "https://bugzilla.suse.com/1177193"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177194",
        "url": "https://bugzilla.suse.com/1177194"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177206",
        "url": "https://bugzilla.suse.com/1177206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177258",
        "url": "https://bugzilla.suse.com/1177258"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177271",
        "url": "https://bugzilla.suse.com/1177271"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177281",
        "url": "https://bugzilla.suse.com/1177281"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177283",
        "url": "https://bugzilla.suse.com/1177283"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177284",
        "url": "https://bugzilla.suse.com/1177284"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177285",
        "url": "https://bugzilla.suse.com/1177285"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177286",
        "url": "https://bugzilla.suse.com/1177286"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177297",
        "url": "https://bugzilla.suse.com/1177297"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177326",
        "url": "https://bugzilla.suse.com/1177326"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177353",
        "url": "https://bugzilla.suse.com/1177353"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177384",
        "url": "https://bugzilla.suse.com/1177384"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177397",
        "url": "https://bugzilla.suse.com/1177397"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177410",
        "url": "https://bugzilla.suse.com/1177410"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177411",
        "url": "https://bugzilla.suse.com/1177411"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177470",
        "url": "https://bugzilla.suse.com/1177470"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177500",
        "url": "https://bugzilla.suse.com/1177500"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177511",
        "url": "https://bugzilla.suse.com/1177511"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177617",
        "url": "https://bugzilla.suse.com/1177617"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177666",
        "url": "https://bugzilla.suse.com/1177666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177679",
        "url": "https://bugzilla.suse.com/1177679"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177681",
        "url": "https://bugzilla.suse.com/1177681"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177683",
        "url": "https://bugzilla.suse.com/1177683"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177687",
        "url": "https://bugzilla.suse.com/1177687"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177694",
        "url": "https://bugzilla.suse.com/1177694"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177697",
        "url": "https://bugzilla.suse.com/1177697"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177698",
        "url": "https://bugzilla.suse.com/1177698"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177703",
        "url": "https://bugzilla.suse.com/1177703"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177719",
        "url": "https://bugzilla.suse.com/1177719"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177724",
        "url": "https://bugzilla.suse.com/1177724"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177725",
        "url": "https://bugzilla.suse.com/1177725"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177726",
        "url": "https://bugzilla.suse.com/1177726"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177733",
        "url": "https://bugzilla.suse.com/1177733"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177739",
        "url": "https://bugzilla.suse.com/1177739"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177749",
        "url": "https://bugzilla.suse.com/1177749"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177750",
        "url": "https://bugzilla.suse.com/1177750"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177754",
        "url": "https://bugzilla.suse.com/1177754"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177755",
        "url": "https://bugzilla.suse.com/1177755"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177765",
        "url": "https://bugzilla.suse.com/1177765"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177766",
        "url": "https://bugzilla.suse.com/1177766"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177799",
        "url": "https://bugzilla.suse.com/1177799"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177801",
        "url": "https://bugzilla.suse.com/1177801"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177814",
        "url": "https://bugzilla.suse.com/1177814"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177817",
        "url": "https://bugzilla.suse.com/1177817"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177820",
        "url": "https://bugzilla.suse.com/1177820"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177854",
        "url": "https://bugzilla.suse.com/1177854"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177855",
        "url": "https://bugzilla.suse.com/1177855"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177856",
        "url": "https://bugzilla.suse.com/1177856"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177861",
        "url": "https://bugzilla.suse.com/1177861"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178002",
        "url": "https://bugzilla.suse.com/1178002"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178049",
        "url": "https://bugzilla.suse.com/1178049"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178079",
        "url": "https://bugzilla.suse.com/1178079"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178123",
        "url": "https://bugzilla.suse.com/1178123"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178166",
        "url": "https://bugzilla.suse.com/1178166"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178173",
        "url": "https://bugzilla.suse.com/1178173"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178175",
        "url": "https://bugzilla.suse.com/1178175"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178176",
        "url": "https://bugzilla.suse.com/1178176"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178177",
        "url": "https://bugzilla.suse.com/1178177"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178182",
        "url": "https://bugzilla.suse.com/1178182"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178183",
        "url": "https://bugzilla.suse.com/1178183"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178184",
        "url": "https://bugzilla.suse.com/1178184"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178185",
        "url": "https://bugzilla.suse.com/1178185"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178186",
        "url": "https://bugzilla.suse.com/1178186"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178190",
        "url": "https://bugzilla.suse.com/1178190"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178191",
        "url": "https://bugzilla.suse.com/1178191"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178203",
        "url": "https://bugzilla.suse.com/1178203"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178227",
        "url": "https://bugzilla.suse.com/1178227"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178246",
        "url": "https://bugzilla.suse.com/1178246"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178255",
        "url": "https://bugzilla.suse.com/1178255"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178270",
        "url": "https://bugzilla.suse.com/1178270"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178286",
        "url": "https://bugzilla.suse.com/1178286"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178307",
        "url": "https://bugzilla.suse.com/1178307"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178330",
        "url": "https://bugzilla.suse.com/1178330"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178393",
        "url": "https://bugzilla.suse.com/1178393"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178395",
        "url": "https://bugzilla.suse.com/1178395"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178401",
        "url": "https://bugzilla.suse.com/1178401"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178426",
        "url": "https://bugzilla.suse.com/1178426"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178461",
        "url": "https://bugzilla.suse.com/1178461"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178579",
        "url": "https://bugzilla.suse.com/1178579"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178581",
        "url": "https://bugzilla.suse.com/1178581"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178584",
        "url": "https://bugzilla.suse.com/1178584"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178585",
        "url": "https://bugzilla.suse.com/1178585"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178589",
        "url": "https://bugzilla.suse.com/1178589"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178590",
        "url": "https://bugzilla.suse.com/1178590"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178612",
        "url": "https://bugzilla.suse.com/1178612"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178634",
        "url": "https://bugzilla.suse.com/1178634"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178635",
        "url": "https://bugzilla.suse.com/1178635"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178653",
        "url": "https://bugzilla.suse.com/1178653"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178659",
        "url": "https://bugzilla.suse.com/1178659"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178660",
        "url": "https://bugzilla.suse.com/1178660"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178661",
        "url": "https://bugzilla.suse.com/1178661"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178669",
        "url": "https://bugzilla.suse.com/1178669"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178686",
        "url": "https://bugzilla.suse.com/1178686"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178740",
        "url": "https://bugzilla.suse.com/1178740"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178755",
        "url": "https://bugzilla.suse.com/1178755"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178756",
        "url": "https://bugzilla.suse.com/1178756"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178762",
        "url": "https://bugzilla.suse.com/1178762"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178780",
        "url": "https://bugzilla.suse.com/1178780"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178838",
        "url": "https://bugzilla.suse.com/1178838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178853",
        "url": "https://bugzilla.suse.com/1178853"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1178886",
        "url": "https://bugzilla.suse.com/1178886"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179001",
        "url": "https://bugzilla.suse.com/1179001"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179012",
        "url": "https://bugzilla.suse.com/1179012"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179014",
        "url": "https://bugzilla.suse.com/1179014"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179015",
        "url": "https://bugzilla.suse.com/1179015"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179045",
        "url": "https://bugzilla.suse.com/1179045"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179076",
        "url": "https://bugzilla.suse.com/1179076"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179082",
        "url": "https://bugzilla.suse.com/1179082"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179107",
        "url": "https://bugzilla.suse.com/1179107"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179140",
        "url": "https://bugzilla.suse.com/1179140"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179141",
        "url": "https://bugzilla.suse.com/1179141"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179160",
        "url": "https://bugzilla.suse.com/1179160"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179201",
        "url": "https://bugzilla.suse.com/1179201"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179204",
        "url": "https://bugzilla.suse.com/1179204"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179211",
        "url": "https://bugzilla.suse.com/1179211"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179217",
        "url": "https://bugzilla.suse.com/1179217"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179419",
        "url": "https://bugzilla.suse.com/1179419"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179424",
        "url": "https://bugzilla.suse.com/1179424"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179425",
        "url": "https://bugzilla.suse.com/1179425"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179426",
        "url": "https://bugzilla.suse.com/1179426"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179427",
        "url": "https://bugzilla.suse.com/1179427"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179429",
        "url": "https://bugzilla.suse.com/1179429"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179432",
        "url": "https://bugzilla.suse.com/1179432"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179434",
        "url": "https://bugzilla.suse.com/1179434"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179435",
        "url": "https://bugzilla.suse.com/1179435"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179442",
        "url": "https://bugzilla.suse.com/1179442"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179519",
        "url": "https://bugzilla.suse.com/1179519"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179550",
        "url": "https://bugzilla.suse.com/1179550"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179575",
        "url": "https://bugzilla.suse.com/1179575"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179578",
        "url": "https://bugzilla.suse.com/1179578"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179601",
        "url": "https://bugzilla.suse.com/1179601"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179604",
        "url": "https://bugzilla.suse.com/1179604"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179639",
        "url": "https://bugzilla.suse.com/1179639"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179652",
        "url": "https://bugzilla.suse.com/1179652"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179656",
        "url": "https://bugzilla.suse.com/1179656"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179670",
        "url": "https://bugzilla.suse.com/1179670"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179671",
        "url": "https://bugzilla.suse.com/1179671"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179672",
        "url": "https://bugzilla.suse.com/1179672"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179673",
        "url": "https://bugzilla.suse.com/1179673"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179675",
        "url": "https://bugzilla.suse.com/1179675"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179676",
        "url": "https://bugzilla.suse.com/1179676"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179677",
        "url": "https://bugzilla.suse.com/1179677"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179678",
        "url": "https://bugzilla.suse.com/1179678"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179679",
        "url": "https://bugzilla.suse.com/1179679"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179680",
        "url": "https://bugzilla.suse.com/1179680"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179681",
        "url": "https://bugzilla.suse.com/1179681"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179682",
        "url": "https://bugzilla.suse.com/1179682"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179683",
        "url": "https://bugzilla.suse.com/1179683"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179684",
        "url": "https://bugzilla.suse.com/1179684"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179685",
        "url": "https://bugzilla.suse.com/1179685"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179687",
        "url": "https://bugzilla.suse.com/1179687"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179688",
        "url": "https://bugzilla.suse.com/1179688"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179689",
        "url": "https://bugzilla.suse.com/1179689"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179690",
        "url": "https://bugzilla.suse.com/1179690"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179703",
        "url": "https://bugzilla.suse.com/1179703"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179704",
        "url": "https://bugzilla.suse.com/1179704"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179707",
        "url": "https://bugzilla.suse.com/1179707"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179709",
        "url": "https://bugzilla.suse.com/1179709"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179710",
        "url": "https://bugzilla.suse.com/1179710"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179711",
        "url": "https://bugzilla.suse.com/1179711"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179712",
        "url": "https://bugzilla.suse.com/1179712"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179713",
        "url": "https://bugzilla.suse.com/1179713"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179714",
        "url": "https://bugzilla.suse.com/1179714"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179715",
        "url": "https://bugzilla.suse.com/1179715"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179716",
        "url": "https://bugzilla.suse.com/1179716"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179745",
        "url": "https://bugzilla.suse.com/1179745"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179763",
        "url": "https://bugzilla.suse.com/1179763"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179887",
        "url": "https://bugzilla.suse.com/1179887"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179888",
        "url": "https://bugzilla.suse.com/1179888"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179892",
        "url": "https://bugzilla.suse.com/1179892"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179896",
        "url": "https://bugzilla.suse.com/1179896"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179960",
        "url": "https://bugzilla.suse.com/1179960"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179963",
        "url": "https://bugzilla.suse.com/1179963"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180027",
        "url": "https://bugzilla.suse.com/1180027"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180029",
        "url": "https://bugzilla.suse.com/1180029"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180031",
        "url": "https://bugzilla.suse.com/1180031"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180052",
        "url": "https://bugzilla.suse.com/1180052"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180056",
        "url": "https://bugzilla.suse.com/1180056"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180086",
        "url": "https://bugzilla.suse.com/1180086"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180117",
        "url": "https://bugzilla.suse.com/1180117"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180258",
        "url": "https://bugzilla.suse.com/1180258"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180261",
        "url": "https://bugzilla.suse.com/1180261"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180349",
        "url": "https://bugzilla.suse.com/1180349"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180506",
        "url": "https://bugzilla.suse.com/1180506"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180541",
        "url": "https://bugzilla.suse.com/1180541"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180559",
        "url": "https://bugzilla.suse.com/1180559"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180566",
        "url": "https://bugzilla.suse.com/1180566"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 173030",
        "url": "https://bugzilla.suse.com/173030"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 744692",
        "url": "https://bugzilla.suse.com/744692"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 789311",
        "url": "https://bugzilla.suse.com/789311"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 954532",
        "url": "https://bugzilla.suse.com/954532"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 995541",
        "url": "https://bugzilla.suse.com/995541"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19462 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19462/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20810 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20810/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20812 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20812/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-0110 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-0110/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-0305 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-0305/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-0404 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-0404/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-0427 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-0427/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-0431 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-0431/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-0432 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-0432/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-0444 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-0444/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-0465 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-0465/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-0466 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-0466/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-0543 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-0543/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10135 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10135/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10711 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10711/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10732 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10732/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10751 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10751/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10757 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10757/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10766 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10766/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10767 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10767/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10768 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10768/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10773 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10773/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10781 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10781/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-11668 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-11668/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12351 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12351/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12352 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12352/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12652 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12652/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12656 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12656/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12769 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12769/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12771 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12771/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12888 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12888/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-13143 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-13143/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-13974 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-13974/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-14314 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-14314/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-14331 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-14331/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-14351 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-14351/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-14356 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-14356/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-14385 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-14385/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-14386 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-14386/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-14390 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-14390/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-14416 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-14416/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-15393 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-15393/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-15436 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-15436/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-15437 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-15437/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-15780 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-15780/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-16120 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-16120/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-16166 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-16166/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-1749 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-1749/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-24490 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-24490/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-25212 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-25212/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-25284 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-25284/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-25285 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-25285/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-25641 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-25641/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-25643 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-25643/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-25645 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-25645/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-25656 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-25656/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-25668 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-25668/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-25669 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-25669/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-25704 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-25704/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-25705 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-25705/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-26088 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-26088/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27068 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27068/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27777 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27777/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27786 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27786/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27825 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27825/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27830 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27830/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-28915 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-28915/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-28941 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-28941/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-28974 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-28974/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-29369 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-29369/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-29370 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-29370/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-29371 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-29371/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-29373 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-29373/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-29660 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-29660/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-29661 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-29661/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-36158 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-36158/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-4788 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-4788/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8694 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8694/"
      }
    ],
    "title": "Security update for RT kernel",
    "tracking": {
      "current_release_date": "2021-02-05T15:16:03Z",
      "generator": {
        "date": "2021-02-05T15:16:03Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2021:0242-1",
      "initial_release_date": "2021-02-05T15:16:03Z",
      "revision_history": [
        {
          "date": "2021-02-05T15:16:03Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
                "product": {
                  "name": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
                  "product_id": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
                "product": {
                  "name": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
                  "product_id": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
                  "product_id": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
                  "product_id": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
                  "product_id": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
                  "product_id": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
                  "product_id": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
                  "product_id": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-5.3.18-lp152.3.5.1.x86_64",
                "product": {
                  "name": "kernel-rt-5.3.18-lp152.3.5.1.x86_64",
                  "product_id": "kernel-rt-5.3.18-lp152.3.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
                "product": {
                  "name": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
                  "product_id": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
                "product": {
                  "name": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
                  "product_id": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
                  "product_id": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
                  "product_id": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
                  "product_id": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
                "product": {
                  "name": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
                  "product_id": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
                  "product_id": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
                  "product_id": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
                  "product_id": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
                  "product_id": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
                  "product_id": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
                  "product_id": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.2",
                "product": {
                  "name": "openSUSE Leap 15.2",
                  "product_id": "openSUSE Leap 15.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64"
        },
        "product_reference": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        },
        "product_reference": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64"
        },
        "product_reference": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        },
        "product_reference": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch"
        },
        "product_reference": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64"
        },
        "product_reference": "kernel-rt-5.3.18-lp152.3.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64"
        },
        "product_reference": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64"
        },
        "product_reference": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        },
        "product_reference": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64"
        },
        "product_reference": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64"
        },
        "product_reference": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch"
        },
        "product_reference": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64"
        },
        "product_reference": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64"
        },
        "product_reference": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        },
        "product_reference": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-19462",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19462"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19462",
          "url": "https://www.suse.com/security/cve/CVE-2019-19462"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158265 for CVE-2019-19462",
          "url": "https://bugzilla.suse.com/1158265"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19462"
    },
    {
      "cve": "CVE-2019-20810",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20810"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20810",
          "url": "https://www.suse.com/security/cve/CVE-2019-20810"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172458 for CVE-2019-20810",
          "url": "https://bugzilla.suse.com/1172458"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-20810"
    },
    {
      "cve": "CVE-2019-20812",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20812"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20812",
          "url": "https://www.suse.com/security/cve/CVE-2019-20812"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172453 for CVE-2019-20812",
          "url": "https://bugzilla.suse.com/1172453"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-20812"
    },
    {
      "cve": "CVE-2020-0110",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-0110"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In psi_write of psi.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-148159562References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-0110",
          "url": "https://www.suse.com/security/cve/CVE-2020-0110"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171374 for CVE-2020-0110",
          "url": "https://bugzilla.suse.com/1171374"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1174874 for CVE-2020-0110",
          "url": "https://bugzilla.suse.com/1174874"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-0110"
    },
    {
      "cve": "CVE-2020-0305",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-0305"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-0305",
          "url": "https://www.suse.com/security/cve/CVE-2020-0305"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1174462 for CVE-2020-0305",
          "url": "https://bugzilla.suse.com/1174462"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-0305"
    },
    {
      "cve": "CVE-2020-0404",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-0404"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-0404",
          "url": "https://www.suse.com/security/cve/CVE-2020-0404"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176423 for CVE-2020-0404",
          "url": "https://bugzilla.suse.com/1176423"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-0404"
    },
    {
      "cve": "CVE-2020-0427",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-0427"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-0427",
          "url": "https://www.suse.com/security/cve/CVE-2020-0427"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176725 for CVE-2020-0427",
          "url": "https://bugzilla.suse.com/1176725"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-0427"
    },
    {
      "cve": "CVE-2020-0431",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-0431"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-0431",
          "url": "https://www.suse.com/security/cve/CVE-2020-0431"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176722 for CVE-2020-0431",
          "url": "https://bugzilla.suse.com/1176722"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176896 for CVE-2020-0431",
          "url": "https://bugzilla.suse.com/1176896"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-0431"
    },
    {
      "cve": "CVE-2020-0432",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-0432"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-0432",
          "url": "https://www.suse.com/security/cve/CVE-2020-0432"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176721 for CVE-2020-0432",
          "url": "https://bugzilla.suse.com/1176721"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177165 for CVE-2020-0432",
          "url": "https://bugzilla.suse.com/1177165"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-0432"
    },
    {
      "cve": "CVE-2020-0444",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-0444"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-0444",
          "url": "https://www.suse.com/security/cve/CVE-2020-0444"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1180027 for CVE-2020-0444",
          "url": "https://bugzilla.suse.com/1180027"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1180028 for CVE-2020-0444",
          "url": "https://bugzilla.suse.com/1180028"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-0444"
    },
    {
      "cve": "CVE-2020-0465",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-0465"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-0465",
          "url": "https://www.suse.com/security/cve/CVE-2020-0465"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1180029 for CVE-2020-0465",
          "url": "https://bugzilla.suse.com/1180029"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1180030 for CVE-2020-0465",
          "url": "https://bugzilla.suse.com/1180030"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-0465"
    },
    {
      "cve": "CVE-2020-0466",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-0466"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-0466",
          "url": "https://www.suse.com/security/cve/CVE-2020-0466"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1180031 for CVE-2020-0466",
          "url": "https://bugzilla.suse.com/1180031"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1180032 for CVE-2020-0466",
          "url": "https://bugzilla.suse.com/1180032"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199255 for CVE-2020-0466",
          "url": "https://bugzilla.suse.com/1199255"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200084 for CVE-2020-0466",
          "url": "https://bugzilla.suse.com/1200084"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-0466"
    },
    {
      "cve": "CVE-2020-0543",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-0543"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-0543",
          "url": "https://www.suse.com/security/cve/CVE-2020-0543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1154824 for CVE-2020-0543",
          "url": "https://bugzilla.suse.com/1154824"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172205 for CVE-2020-0543",
          "url": "https://bugzilla.suse.com/1172205"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172206 for CVE-2020-0543",
          "url": "https://bugzilla.suse.com/1172206"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172207 for CVE-2020-0543",
          "url": "https://bugzilla.suse.com/1172207"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172770 for CVE-2020-0543",
          "url": "https://bugzilla.suse.com/1172770"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2020-0543",
          "url": "https://bugzilla.suse.com/1178658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201877 for CVE-2020-0543",
          "url": "https://bugzilla.suse.com/1201877"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-0543"
    },
    {
      "cve": "CVE-2020-10135",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10135"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10135",
          "url": "https://www.suse.com/security/cve/CVE-2020-10135"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171988 for CVE-2020-10135",
          "url": "https://bugzilla.suse.com/1171988"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10135"
    },
    {
      "cve": "CVE-2020-10711",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10711"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10711",
          "url": "https://www.suse.com/security/cve/CVE-2020-10711"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171191 for CVE-2020-10711",
          "url": "https://bugzilla.suse.com/1171191"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10711"
    },
    {
      "cve": "CVE-2020-10732",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10732"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10732",
          "url": "https://www.suse.com/security/cve/CVE-2020-10732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171220 for CVE-2020-10732",
          "url": "https://bugzilla.suse.com/1171220"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-10732"
    },
    {
      "cve": "CVE-2020-10751",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10751"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10751",
          "url": "https://www.suse.com/security/cve/CVE-2020-10751"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171189 for CVE-2020-10751",
          "url": "https://bugzilla.suse.com/1171189"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1174963 for CVE-2020-10751",
          "url": "https://bugzilla.suse.com/1174963"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10751"
    },
    {
      "cve": "CVE-2020-10757",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10757"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10757",
          "url": "https://www.suse.com/security/cve/CVE-2020-10757"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159281 for CVE-2020-10757",
          "url": "https://bugzilla.suse.com/1159281"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172317 for CVE-2020-10757",
          "url": "https://bugzilla.suse.com/1172317"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172437 for CVE-2020-10757",
          "url": "https://bugzilla.suse.com/1172437"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-10757"
    },
    {
      "cve": "CVE-2020-10766",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10766"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10766",
          "url": "https://www.suse.com/security/cve/CVE-2020-10766"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159281 for CVE-2020-10766",
          "url": "https://bugzilla.suse.com/1159281"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172781 for CVE-2020-10766",
          "url": "https://bugzilla.suse.com/1172781"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10766"
    },
    {
      "cve": "CVE-2020-10767",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10767"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10767",
          "url": "https://www.suse.com/security/cve/CVE-2020-10767"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159281 for CVE-2020-10767",
          "url": "https://bugzilla.suse.com/1159281"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172782 for CVE-2020-10767",
          "url": "https://bugzilla.suse.com/1172782"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10767"
    },
    {
      "cve": "CVE-2020-10768",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10768"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10768",
          "url": "https://www.suse.com/security/cve/CVE-2020-10768"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159281 for CVE-2020-10768",
          "url": "https://bugzilla.suse.com/1159281"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172783 for CVE-2020-10768",
          "url": "https://bugzilla.suse.com/1172783"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10768"
    },
    {
      "cve": "CVE-2020-10773",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10773"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u0027s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10773",
          "url": "https://www.suse.com/security/cve/CVE-2020-10773"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172999 for CVE-2020-10773",
          "url": "https://bugzilla.suse.com/1172999"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-10773"
    },
    {
      "cve": "CVE-2020-10781",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10781"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10781",
          "url": "https://www.suse.com/security/cve/CVE-2020-10781"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173074 for CVE-2020-10781",
          "url": "https://bugzilla.suse.com/1173074"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10781"
    },
    {
      "cve": "CVE-2020-11668",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-11668"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-11668",
          "url": "https://www.suse.com/security/cve/CVE-2020-11668"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1168952 for CVE-2020-11668",
          "url": "https://bugzilla.suse.com/1168952"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173942 for CVE-2020-11668",
          "url": "https://bugzilla.suse.com/1173942"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-11668"
    },
    {
      "cve": "CVE-2020-12351",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12351"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12351",
          "url": "https://www.suse.com/security/cve/CVE-2020-12351"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177724 for CVE-2020-12351",
          "url": "https://bugzilla.suse.com/1177724"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177729 for CVE-2020-12351",
          "url": "https://bugzilla.suse.com/1177729"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178397 for CVE-2020-12351",
          "url": "https://bugzilla.suse.com/1178397"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-12351"
    },
    {
      "cve": "CVE-2020-12352",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12352"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12352",
          "url": "https://www.suse.com/security/cve/CVE-2020-12352"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177725 for CVE-2020-12352",
          "url": "https://bugzilla.suse.com/1177725"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178398 for CVE-2020-12352",
          "url": "https://bugzilla.suse.com/1178398"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-12352"
    },
    {
      "cve": "CVE-2020-12652",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12652"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12652",
          "url": "https://www.suse.com/security/cve/CVE-2020-12652"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171218 for CVE-2020-12652",
          "url": "https://bugzilla.suse.com/1171218"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-12652"
    },
    {
      "cve": "CVE-2020-12656",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12656"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** DISPUTED ** gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12656",
          "url": "https://www.suse.com/security/cve/CVE-2020-12656"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171219 for CVE-2020-12656",
          "url": "https://bugzilla.suse.com/1171219"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-12656"
    },
    {
      "cve": "CVE-2020-12769",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12769"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12769",
          "url": "https://www.suse.com/security/cve/CVE-2020-12769"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171983 for CVE-2020-12769",
          "url": "https://bugzilla.suse.com/1171983"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-12769"
    },
    {
      "cve": "CVE-2020-12771",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12771"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12771",
          "url": "https://www.suse.com/security/cve/CVE-2020-12771"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171732 for CVE-2020-12771",
          "url": "https://bugzilla.suse.com/1171732"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-12771"
    },
    {
      "cve": "CVE-2020-12888",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12888"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12888",
          "url": "https://www.suse.com/security/cve/CVE-2020-12888"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159281 for CVE-2020-12888",
          "url": "https://bugzilla.suse.com/1159281"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171868 for CVE-2020-12888",
          "url": "https://bugzilla.suse.com/1171868"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176979 for CVE-2020-12888",
          "url": "https://bugzilla.suse.com/1176979"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179612 for CVE-2020-12888",
          "url": "https://bugzilla.suse.com/1179612"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-12888"
    },
    {
      "cve": "CVE-2020-13143",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-13143"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-13143",
          "url": "https://www.suse.com/security/cve/CVE-2020-13143"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171982 for CVE-2020-13143",
          "url": "https://bugzilla.suse.com/1171982"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-13143"
    },
    {
      "cve": "CVE-2020-13974",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-13974"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-13974",
          "url": "https://www.suse.com/security/cve/CVE-2020-13974"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172775 for CVE-2020-13974",
          "url": "https://bugzilla.suse.com/1172775"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-13974"
    },
    {
      "cve": "CVE-2020-14314",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-14314"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-14314",
          "url": "https://www.suse.com/security/cve/CVE-2020-14314"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173798 for CVE-2020-14314",
          "url": "https://bugzilla.suse.com/1173798"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.8,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-14314"
    },
    {
      "cve": "CVE-2020-14331",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-14331"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-14331",
          "url": "https://www.suse.com/security/cve/CVE-2020-14331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1174205 for CVE-2020-14331",
          "url": "https://bugzilla.suse.com/1174205"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1174247 for CVE-2020-14331",
          "url": "https://bugzilla.suse.com/1174247"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-14331"
    },
    {
      "cve": "CVE-2020-14351",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-14351"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-14351",
          "url": "https://www.suse.com/security/cve/CVE-2020-14351"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177086 for CVE-2020-14351",
          "url": "https://bugzilla.suse.com/1177086"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-14351"
    },
    {
      "cve": "CVE-2020-14356",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-14356"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-14356",
          "url": "https://www.suse.com/security/cve/CVE-2020-14356"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1175213 for CVE-2020-14356",
          "url": "https://bugzilla.suse.com/1175213"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176392 for CVE-2020-14356",
          "url": "https://bugzilla.suse.com/1176392"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-14356"
    },
    {
      "cve": "CVE-2020-14385",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-14385"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel before 5.9-rc4. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a denial of service. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-14385",
          "url": "https://www.suse.com/security/cve/CVE-2020-14385"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176137 for CVE-2020-14385",
          "url": "https://bugzilla.suse.com/1176137"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-14385"
    },
    {
      "cve": "CVE-2020-14386",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-14386"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-14386",
          "url": "https://www.suse.com/security/cve/CVE-2020-14386"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176069 for CVE-2020-14386",
          "url": "https://bugzilla.suse.com/1176069"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176072 for CVE-2020-14386",
          "url": "https://bugzilla.suse.com/1176072"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-14386"
    },
    {
      "cve": "CVE-2020-14390",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-14390"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-14390",
          "url": "https://www.suse.com/security/cve/CVE-2020-14390"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176235 for CVE-2020-14390",
          "url": "https://bugzilla.suse.com/1176235"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176253 for CVE-2020-14390",
          "url": "https://bugzilla.suse.com/1176253"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176278 for CVE-2020-14390",
          "url": "https://bugzilla.suse.com/1176278"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-14390"
    },
    {
      "cve": "CVE-2020-14416",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-14416"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-14416",
          "url": "https://www.suse.com/security/cve/CVE-2020-14416"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162002 for CVE-2020-14416",
          "url": "https://bugzilla.suse.com/1162002"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-14416"
    },
    {
      "cve": "CVE-2020-15393",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-15393"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-15393",
          "url": "https://www.suse.com/security/cve/CVE-2020-15393"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173514 for CVE-2020-15393",
          "url": "https://bugzilla.suse.com/1173514"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-15393"
    },
    {
      "cve": "CVE-2020-15436",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-15436"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-15436",
          "url": "https://www.suse.com/security/cve/CVE-2020-15436"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179141 for CVE-2020-15436",
          "url": "https://bugzilla.suse.com/1179141"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-15436"
    },
    {
      "cve": "CVE-2020-15437",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-15437"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p-\u003eserial_in pointer which uninitialized.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-15437",
          "url": "https://www.suse.com/security/cve/CVE-2020-15437"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179140 for CVE-2020-15437",
          "url": "https://bugzilla.suse.com/1179140"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-15437"
    },
    {
      "cve": "CVE-2020-15780",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-15780"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-15780",
          "url": "https://www.suse.com/security/cve/CVE-2020-15780"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173573 for CVE-2020-15780",
          "url": "https://bugzilla.suse.com/1173573"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1174186 for CVE-2020-15780",
          "url": "https://bugzilla.suse.com/1174186"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-15780"
    },
    {
      "cve": "CVE-2020-16120",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-16120"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef (\"ovl: stack file ops\"). This was fixed in kernel version 5.8 by commits 56230d9 (\"ovl: verify permissions in ovl_path_open()\"), 48bd024 (\"ovl: switch to mounter creds in readdir\") and 05acefb (\"ovl: check permission to open real file\"). Additionally, commits 130fdbc (\"ovl: pass correct flags for opening real directory\") and 292f902 (\"ovl: call secutiry hook in ovl_real_ioctl()\") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da (\"ovl: do not fail because of O_NOATIMEi\") in kernel 5.11.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-16120",
          "url": "https://www.suse.com/security/cve/CVE-2020-16120"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177470 for CVE-2020-16120",
          "url": "https://bugzilla.suse.com/1177470"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-16120"
    },
    {
      "cve": "CVE-2020-16166",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-16166"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-16166",
          "url": "https://www.suse.com/security/cve/CVE-2020-16166"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1174757 for CVE-2020-16166",
          "url": "https://bugzilla.suse.com/1174757"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-16166"
    },
    {
      "cve": "CVE-2020-1749",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-1749"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-1749",
          "url": "https://www.suse.com/security/cve/CVE-2020-1749"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1165629 for CVE-2020-1749",
          "url": "https://bugzilla.suse.com/1165629"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1165631 for CVE-2020-1749",
          "url": "https://bugzilla.suse.com/1165631"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177511 for CVE-2020-1749",
          "url": "https://bugzilla.suse.com/1177511"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177513 for CVE-2020-1749",
          "url": "https://bugzilla.suse.com/1177513"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189302 for CVE-2020-1749",
          "url": "https://bugzilla.suse.com/1189302"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-1749"
    },
    {
      "cve": "CVE-2020-24490",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-24490"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-24490",
          "url": "https://www.suse.com/security/cve/CVE-2020-24490"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177726 for CVE-2020-24490",
          "url": "https://bugzilla.suse.com/1177726"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177727 for CVE-2020-24490",
          "url": "https://bugzilla.suse.com/1177727"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-24490"
    },
    {
      "cve": "CVE-2020-25212",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-25212"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-25212",
          "url": "https://www.suse.com/security/cve/CVE-2020-25212"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176381 for CVE-2020-25212",
          "url": "https://bugzilla.suse.com/1176381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176382 for CVE-2020-25212",
          "url": "https://bugzilla.suse.com/1176382"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177027 for CVE-2020-25212",
          "url": "https://bugzilla.suse.com/1177027"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-25212"
    },
    {
      "cve": "CVE-2020-25284",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-25284"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-25284",
          "url": "https://www.suse.com/security/cve/CVE-2020-25284"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176482 for CVE-2020-25284",
          "url": "https://bugzilla.suse.com/1176482"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-25284"
    },
    {
      "cve": "CVE-2020-25285",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-25285"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-25285",
          "url": "https://www.suse.com/security/cve/CVE-2020-25285"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176485 for CVE-2020-25285",
          "url": "https://bugzilla.suse.com/1176485"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-25285"
    },
    {
      "cve": "CVE-2020-25641",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-25641"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-25641",
          "url": "https://www.suse.com/security/cve/CVE-2020-25641"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177121 for CVE-2020-25641",
          "url": "https://bugzilla.suse.com/1177121"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-25641"
    },
    {
      "cve": "CVE-2020-25643",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-25643"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-25643",
          "url": "https://www.suse.com/security/cve/CVE-2020-25643"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177206 for CVE-2020-25643",
          "url": "https://bugzilla.suse.com/1177206"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177226 for CVE-2020-25643",
          "url": "https://bugzilla.suse.com/1177226"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-25643"
    },
    {
      "cve": "CVE-2020-25645",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-25645"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-25645",
          "url": "https://www.suse.com/security/cve/CVE-2020-25645"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177511 for CVE-2020-25645",
          "url": "https://bugzilla.suse.com/1177511"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177513 for CVE-2020-25645",
          "url": "https://bugzilla.suse.com/1177513"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-25645"
    },
    {
      "cve": "CVE-2020-25656",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-25656"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-25656",
          "url": "https://www.suse.com/security/cve/CVE-2020-25656"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177766 for CVE-2020-25656",
          "url": "https://bugzilla.suse.com/1177766"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-25656"
    },
    {
      "cve": "CVE-2020-25668",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-25668"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-25668",
          "url": "https://www.suse.com/security/cve/CVE-2020-25668"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178123 for CVE-2020-25668",
          "url": "https://bugzilla.suse.com/1178123"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178622 for CVE-2020-25668",
          "url": "https://bugzilla.suse.com/1178622"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2020-25668",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-25668"
    },
    {
      "cve": "CVE-2020-25669",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-25669"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-25669",
          "url": "https://www.suse.com/security/cve/CVE-2020-25669"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178182 for CVE-2020-25669",
          "url": "https://bugzilla.suse.com/1178182"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-25669"
    },
    {
      "cve": "CVE-2020-25704",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-25704"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-25704",
          "url": "https://www.suse.com/security/cve/CVE-2020-25704"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178393 for CVE-2020-25704",
          "url": "https://bugzilla.suse.com/1178393"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-25704"
    },
    {
      "cve": "CVE-2020-25705",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-25705"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-25705",
          "url": "https://www.suse.com/security/cve/CVE-2020-25705"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1175721 for CVE-2020-25705",
          "url": "https://bugzilla.suse.com/1175721"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178782 for CVE-2020-25705",
          "url": "https://bugzilla.suse.com/1178782"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178783 for CVE-2020-25705",
          "url": "https://bugzilla.suse.com/1178783"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191790 for CVE-2020-25705",
          "url": "https://bugzilla.suse.com/1191790"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-25705"
    },
    {
      "cve": "CVE-2020-26088",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-26088"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-26088",
          "url": "https://www.suse.com/security/cve/CVE-2020-26088"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176990 for CVE-2020-26088",
          "url": "https://bugzilla.suse.com/1176990"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-26088"
    },
    {
      "cve": "CVE-2020-27068",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27068"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27068",
          "url": "https://www.suse.com/security/cve/CVE-2020-27068"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1180086 for CVE-2020-27068",
          "url": "https://bugzilla.suse.com/1180086"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-27068"
    },
    {
      "cve": "CVE-2020-27777",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27777"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27777",
          "url": "https://www.suse.com/security/cve/CVE-2020-27777"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179107 for CVE-2020-27777",
          "url": "https://bugzilla.suse.com/1179107"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179419 for CVE-2020-27777",
          "url": "https://bugzilla.suse.com/1179419"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200343 for CVE-2020-27777",
          "url": "https://bugzilla.suse.com/1200343"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220060 for CVE-2020-27777",
          "url": "https://bugzilla.suse.com/1220060"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-27777"
    },
    {
      "cve": "CVE-2020-27786",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27786"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27786",
          "url": "https://www.suse.com/security/cve/CVE-2020-27786"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179601 for CVE-2020-27786",
          "url": "https://bugzilla.suse.com/1179601"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179616 for CVE-2020-27786",
          "url": "https://bugzilla.suse.com/1179616"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-27786"
    },
    {
      "cve": "CVE-2020-27825",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27825"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27825",
          "url": "https://www.suse.com/security/cve/CVE-2020-27825"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179960 for CVE-2020-27825",
          "url": "https://bugzilla.suse.com/1179960"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179961 for CVE-2020-27825",
          "url": "https://bugzilla.suse.com/1179961"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-27825"
    },
    {
      "cve": "CVE-2020-27830",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27830"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27830",
          "url": "https://www.suse.com/security/cve/CVE-2020-27830"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179656 for CVE-2020-27830",
          "url": "https://bugzilla.suse.com/1179656"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-27830"
    },
    {
      "cve": "CVE-2020-28915",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-28915"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-28915",
          "url": "https://www.suse.com/security/cve/CVE-2020-28915"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178886 for CVE-2020-28915",
          "url": "https://bugzilla.suse.com/1178886"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-28915"
    },
    {
      "cve": "CVE-2020-28941",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-28941"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in drivers/accessibility/speakup/spk_ttyio.c in the Linux kernel through 5.9.9. Local attackers on systems with the speakup driver could cause a local denial of service attack, aka CID-d41227544427. This occurs because of an invalid free when the line discipline is used more than once.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-28941",
          "url": "https://www.suse.com/security/cve/CVE-2020-28941"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178740 for CVE-2020-28941",
          "url": "https://bugzilla.suse.com/1178740"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-28941"
    },
    {
      "cve": "CVE-2020-28974",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-28974"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-28974",
          "url": "https://www.suse.com/security/cve/CVE-2020-28974"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178589 for CVE-2020-28974",
          "url": "https://bugzilla.suse.com/1178589"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-28974"
    },
    {
      "cve": "CVE-2020-29369",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-29369"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-29369",
          "url": "https://www.suse.com/security/cve/CVE-2020-29369"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173504 for CVE-2020-29369",
          "url": "https://bugzilla.suse.com/1173504"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179432 for CVE-2020-29369",
          "url": "https://bugzilla.suse.com/1179432"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179646 for CVE-2020-29369",
          "url": "https://bugzilla.suse.com/1179646"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1182109 for CVE-2020-29369",
          "url": "https://bugzilla.suse.com/1182109"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-29369"
    },
    {
      "cve": "CVE-2020-29370",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-29370"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-29370",
          "url": "https://www.suse.com/security/cve/CVE-2020-29370"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179435 for CVE-2020-29370",
          "url": "https://bugzilla.suse.com/1179435"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179648 for CVE-2020-29370",
          "url": "https://bugzilla.suse.com/1179648"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-29370"
    },
    {
      "cve": "CVE-2020-29371",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-29371"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-29371",
          "url": "https://www.suse.com/security/cve/CVE-2020-29371"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179429 for CVE-2020-29371",
          "url": "https://bugzilla.suse.com/1179429"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-29371"
    },
    {
      "cve": "CVE-2020-29373",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-29373"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-29373",
          "url": "https://www.suse.com/security/cve/CVE-2020-29373"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179434 for CVE-2020-29373",
          "url": "https://bugzilla.suse.com/1179434"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179779 for CVE-2020-29373",
          "url": "https://bugzilla.suse.com/1179779"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-29373"
    },
    {
      "cve": "CVE-2020-29660",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-29660"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-29660",
          "url": "https://www.suse.com/security/cve/CVE-2020-29660"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179745 for CVE-2020-29660",
          "url": "https://bugzilla.suse.com/1179745"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179877 for CVE-2020-29660",
          "url": "https://bugzilla.suse.com/1179877"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-29660"
    },
    {
      "cve": "CVE-2020-29661",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-29661"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-29661",
          "url": "https://www.suse.com/security/cve/CVE-2020-29661"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179745 for CVE-2020-29661",
          "url": "https://bugzilla.suse.com/1179745"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179877 for CVE-2020-29661",
          "url": "https://bugzilla.suse.com/1179877"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1214268 for CVE-2020-29661",
          "url": "https://bugzilla.suse.com/1214268"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218966 for CVE-2020-29661",
          "url": "https://bugzilla.suse.com/1218966"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-29661"
    },
    {
      "cve": "CVE-2020-36158",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-36158"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-36158",
          "url": "https://www.suse.com/security/cve/CVE-2020-36158"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1180559 for CVE-2020-36158",
          "url": "https://bugzilla.suse.com/1180559"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1180562 for CVE-2020-36158",
          "url": "https://bugzilla.suse.com/1180562"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-36158"
    },
    {
      "cve": "CVE-2020-4788",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-4788"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-4788",
          "url": "https://www.suse.com/security/cve/CVE-2020-4788"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177666 for CVE-2020-4788",
          "url": "https://bugzilla.suse.com/1177666"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1181158 for CVE-2020-4788",
          "url": "https://bugzilla.suse.com/1181158"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-4788"
    },
    {
      "cve": "CVE-2020-8694",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8694"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
          "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
          "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8694",
          "url": "https://www.suse.com/security/cve/CVE-2020-8694"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1170415 for CVE-2020-8694",
          "url": "https://bugzilla.suse.com/1170415"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1170446 for CVE-2020-8694",
          "url": "https://bugzilla.suse.com/1170446"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178591 for CVE-2020-8694",
          "url": "https://bugzilla.suse.com/1178591"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178700 for CVE-2020-8694",
          "url": "https://bugzilla.suse.com/1178700"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179661 for CVE-2020-8694",
          "url": "https://bugzilla.suse.com/1179661"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch",
            "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64",
            "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-02-05T15:16:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8694"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…