<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for kubernetes</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2020:0554-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-04-26T14:12:22Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-04-26T14:12:22Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-04-26T14:12:22Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for kubernetes</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update introduces kubernetes version 1.14.1 and cri-o 1.17.1 to Leap 15.1.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2020-554</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KLMQUDJXG7ORWF7M42NKLDUJSKHAUTS/</URL>
      <Description>E-Mail link for openSUSE-SU-2020:0554-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1039663</URL>
      <Description>SUSE Bug 1039663</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1042383</URL>
      <Description>SUSE Bug 1042383</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1042387</URL>
      <Description>SUSE Bug 1042387</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1057277</URL>
      <Description>SUSE Bug 1057277</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1059207</URL>
      <Description>SUSE Bug 1059207</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1061027</URL>
      <Description>SUSE Bug 1061027</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1065972</URL>
      <Description>SUSE Bug 1065972</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1069469</URL>
      <Description>SUSE Bug 1069469</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1084765</URL>
      <Description>SUSE Bug 1084765</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1084766</URL>
      <Description>SUSE Bug 1084766</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1085009</URL>
      <Description>SUSE Bug 1085009</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1086185</URL>
      <Description>SUSE Bug 1086185</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1086412</URL>
      <Description>SUSE Bug 1086412</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1095131</URL>
      <Description>SUSE Bug 1095131</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1095154</URL>
      <Description>SUSE Bug 1095154</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1096773</URL>
      <Description>SUSE Bug 1096773</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1097473</URL>
      <Description>SUSE Bug 1097473</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1100838</URL>
      <Description>SUSE Bug 1100838</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1101010</URL>
      <Description>SUSE Bug 1101010</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1104598</URL>
      <Description>SUSE Bug 1104598</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1104821</URL>
      <Description>SUSE Bug 1104821</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112980</URL>
      <Description>SUSE Bug 1112980</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1118897</URL>
      <Description>SUSE Bug 1118897</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1118898</URL>
      <Description>SUSE Bug 1118898</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1136403</URL>
      <Description>SUSE Bug 1136403</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1144065</URL>
      <Description>SUSE Bug 1144065</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1155323</URL>
      <Description>SUSE Bug 1155323</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1161056</URL>
      <Description>SUSE Bug 1161056</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1161179</URL>
      <Description>SUSE Bug 1161179</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5195/</URL>
      <Description>SUSE CVE CVE-2016-5195 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8859/</URL>
      <Description>SUSE CVE CVE-2016-8859 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-1002101/</URL>
      <Description>SUSE CVE CVE-2017-1002101 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1002105/</URL>
      <Description>SUSE CVE CVE-2018-1002105 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16873/</URL>
      <Description>SUSE CVE CVE-2018-16873 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16874/</URL>
      <Description>SUSE CVE CVE-2018-16874 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10214/</URL>
      <Description>SUSE CVE CVE-2019-10214 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.1">
      <Branch Type="Product Name" Name="openSUSE Leap 15.1">
        <FullProductName ProductID="openSUSE Leap 15.1" CPE="cpe:/o:opensuse:leap:15.1">openSUSE Leap 15.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="cri-o-1.17.1-lp151.2.2">
      <FullProductName ProductID="cri-o-1.17.1-lp151.2.2">cri-o-1.17.1-lp151.2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cri-o-kubeadm-criconfig-1.17.1-lp151.2.2">
      <FullProductName ProductID="cri-o-kubeadm-criconfig-1.17.1-lp151.2.2">cri-o-kubeadm-criconfig-1.17.1-lp151.2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cri-tools-1.18.0-lp151.2.1">
      <FullProductName ProductID="cri-tools-1.18.0-lp151.2.1">cri-tools-1.18.0-lp151.2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="go1.14-1.14-lp151.6.1">
      <FullProductName ProductID="go1.14-1.14-lp151.6.1">go1.14-1.14-lp151.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="go1.14-doc-1.14-lp151.6.1">
      <FullProductName ProductID="go1.14-doc-1.14-lp151.6.1">go1.14-doc-1.14-lp151.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="go1.14-race-1.14-lp151.6.1">
      <FullProductName ProductID="go1.14-race-1.14-lp151.6.1">go1.14-race-1.14-lp151.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-apiserver-1.18.0-lp151.5.1">
      <FullProductName ProductID="kubernetes-apiserver-1.18.0-lp151.5.1">kubernetes-apiserver-1.18.0-lp151.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-client-1.18.0-lp151.5.1">
      <FullProductName ProductID="kubernetes-client-1.18.0-lp151.5.1">kubernetes-client-1.18.0-lp151.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-controller-manager-1.18.0-lp151.5.1">
      <FullProductName ProductID="kubernetes-controller-manager-1.18.0-lp151.5.1">kubernetes-controller-manager-1.18.0-lp151.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-kubeadm-1.18.0-lp151.5.1">
      <FullProductName ProductID="kubernetes-kubeadm-1.18.0-lp151.5.1">kubernetes-kubeadm-1.18.0-lp151.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-kubelet-common-1.18.0-lp151.5.1">
      <FullProductName ProductID="kubernetes-kubelet-common-1.18.0-lp151.5.1">kubernetes-kubelet-common-1.18.0-lp151.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-kubelet1.17-1.18.0-lp151.5.1">
      <FullProductName ProductID="kubernetes-kubelet1.17-1.18.0-lp151.5.1">kubernetes-kubelet1.17-1.18.0-lp151.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-kubelet1.18-1.18.0-lp151.5.1">
      <FullProductName ProductID="kubernetes-kubelet1.18-1.18.0-lp151.5.1">kubernetes-kubelet1.18-1.18.0-lp151.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-master-1.18.0-lp151.5.1">
      <FullProductName ProductID="kubernetes-master-1.18.0-lp151.5.1">kubernetes-master-1.18.0-lp151.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-node-1.18.0-lp151.5.1">
      <FullProductName ProductID="kubernetes-node-1.18.0-lp151.5.1">kubernetes-node-1.18.0-lp151.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-proxy-1.18.0-lp151.5.1">
      <FullProductName ProductID="kubernetes-proxy-1.18.0-lp151.5.1">kubernetes-proxy-1.18.0-lp151.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-scheduler-1.18.0-lp151.5.1">
      <FullProductName ProductID="kubernetes-scheduler-1.18.0-lp151.5.1">kubernetes-scheduler-1.18.0-lp151.5.1</FullProductName>
    </Branch>
    <Relationship ProductReference="cri-o-1.17.1-lp151.2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2">cri-o-1.17.1-lp151.2.2 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="cri-o-kubeadm-criconfig-1.17.1-lp151.2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2">cri-o-kubeadm-criconfig-1.17.1-lp151.2.2 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="cri-tools-1.18.0-lp151.2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1">cri-tools-1.18.0-lp151.2.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.14-1.14-lp151.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:go1.14-1.14-lp151.6.1">go1.14-1.14-lp151.6.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.14-doc-1.14-lp151.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1">go1.14-doc-1.14-lp151.6.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.14-race-1.14-lp151.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1">go1.14-race-1.14-lp151.6.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes-apiserver-1.18.0-lp151.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1">kubernetes-apiserver-1.18.0-lp151.5.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes-client-1.18.0-lp151.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1">kubernetes-client-1.18.0-lp151.5.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes-controller-manager-1.18.0-lp151.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1">kubernetes-controller-manager-1.18.0-lp151.5.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes-kubeadm-1.18.0-lp151.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1">kubernetes-kubeadm-1.18.0-lp151.5.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes-kubelet-common-1.18.0-lp151.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1">kubernetes-kubelet-common-1.18.0-lp151.5.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes-kubelet1.17-1.18.0-lp151.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1">kubernetes-kubelet1.17-1.18.0-lp151.5.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes-kubelet1.18-1.18.0-lp151.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1">kubernetes-kubelet1.18-1.18.0-lp151.5.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes-master-1.18.0-lp151.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1">kubernetes-master-1.18.0-lp151.5.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes-node-1.18.0-lp151.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1">kubernetes-node-1.18.0-lp151.5.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes-proxy-1.18.0-lp151.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1">kubernetes-proxy-1.18.0-lp151.5.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes-scheduler-1.18.0-lp151.5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1">kubernetes-scheduler-1.18.0-lp151.5.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."</Note>
    </Notes>
    <CVE>CVE-2016-5195</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2</ProductID>
        <ProductID>openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2</ProductID>
        <ProductID>openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.14-1.14-lp151.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.6</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KLMQUDJXG7ORWF7M42NKLDUJSKHAUTS/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5195.html</URL>
        <Description>CVE-2016-5195</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004418</URL>
        <Description>SUSE Bug 1004418</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004419</URL>
        <Description>SUSE Bug 1004419</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004436</URL>
        <Description>SUSE Bug 1004436</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1006323</URL>
        <Description>SUSE Bug 1006323</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1006695</URL>
        <Description>SUSE Bug 1006695</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007291</URL>
        <Description>SUSE Bug 1007291</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008110</URL>
        <Description>SUSE Bug 1008110</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1030118</URL>
        <Description>SUSE Bug 1030118</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1046453</URL>
        <Description>SUSE Bug 1046453</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1069496</URL>
        <Description>SUSE Bug 1069496</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149725</URL>
        <Description>SUSE Bug 1149725</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/870618</URL>
        <Description>SUSE Bug 870618</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986445</URL>
        <Description>SUSE Bug 986445</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998689</URL>
        <Description>SUSE Bug 998689</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.</Note>
    </Notes>
    <CVE>CVE-2016-8859</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2</ProductID>
        <ProductID>openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2</ProductID>
        <ProductID>openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.14-1.14-lp151.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KLMQUDJXG7ORWF7M42NKLDUJSKHAUTS/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8859.html</URL>
        <Description>CVE-2016-8859</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005483</URL>
        <Description>SUSE Bug 1005483</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host's filesystem.</Note>
    </Notes>
    <CVE>CVE-2017-1002101</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2</ProductID>
        <ProductID>openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2</ProductID>
        <ProductID>openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.14-1.14-lp151.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KLMQUDJXG7ORWF7M42NKLDUJSKHAUTS/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-1002101.html</URL>
        <Description>CVE-2017-1002101</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1084923</URL>
        <Description>SUSE Bug 1084923</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085007</URL>
        <Description>SUSE Bug 1085007</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085009</URL>
        <Description>SUSE Bug 1085009</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1096726</URL>
        <Description>SUSE Bug 1096726</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server's TLS credentials used to establish the backend connection.</Note>
    </Notes>
    <CVE>CVE-2018-1002105</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2</ProductID>
        <ProductID>openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2</ProductID>
        <ProductID>openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.14-1.14-lp151.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KLMQUDJXG7ORWF7M42NKLDUJSKHAUTS/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1002105.html</URL>
        <Description>CVE-2018-1002105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118198</URL>
        <Description>SUSE Bug 1118198</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118260</URL>
        <Description>SUSE Bug 1118260</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to remote code execution when executed with the -u flag and the import path of a malicious Go package, or a package that imports it directly or indirectly. Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). Using custom domains, it's possible to arrange things so that a Git repository is cloned to a folder named ".git" by using a vanity import path that ends with "/.git". If the Git repository root contains a "HEAD" file, a "config" file, an "objects" directory, a "refs" directory, with some work to ensure the proper ordering of operations, "go get -u" can be tricked into considering the parent directory as a repository root, and running Git commands on it. That will use the "config" file in the original Git repository root for its configuration, and if that config file contains malicious commands, they will execute on the system running "go get -u".</Note>
    </Notes>
    <CVE>CVE-2018-16873</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2</ProductID>
        <ProductID>openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2</ProductID>
        <ProductID>openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.14-1.14-lp151.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KLMQUDJXG7ORWF7M42NKLDUJSKHAUTS/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16873.html</URL>
        <Description>CVE-2018-16873</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118897</URL>
        <Description>SUSE Bug 1118897</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118898</URL>
        <Description>SUSE Bug 1118898</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118899</URL>
        <Description>SUSE Bug 1118899</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly braces (both '{' and '}' characters). Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). The attacker can cause an arbitrary filesystem write, which can lead to code execution.</Note>
    </Notes>
    <CVE>CVE-2018-16874</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2</ProductID>
        <ProductID>openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2</ProductID>
        <ProductID>openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.14-1.14-lp151.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KLMQUDJXG7ORWF7M42NKLDUJSKHAUTS/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16874.html</URL>
        <Description>CVE-2018-16874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118897</URL>
        <Description>SUSE Bug 1118897</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118898</URL>
        <Description>SUSE Bug 1118898</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118899</URL>
        <Description>SUSE Bug 1118899</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat Enterprise Linux version 8 and CRI-O in OpenShift Container Platform, does not enforce TLS connections to the container registry authorization service. An attacker could use this vulnerability to launch a MiTM attack and steal login credentials or bearer tokens.</Note>
    </Notes>
    <CVE>CVE-2019-10214</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2</ProductID>
        <ProductID>openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2</ProductID>
        <ProductID>openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.14-1.14-lp151.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1</ProductID>
        <ProductID>openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KLMQUDJXG7ORWF7M42NKLDUJSKHAUTS/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10214.html</URL>
        <Description>CVE-2019-10214</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1144065</URL>
        <Description>SUSE Bug 1144065</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
