<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:1008-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-04-12T07:03:49Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-04-12T07:03:49Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-04-12T07:03:49Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
The openSUSE Leap 42.1 kernel was updated to 4.1.20 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2015-1339: A memory leak in cuse could be used to exhaust kernel
  memory. (bsc#969356).
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in
  the Linux kernel did not ensure that certain slot numbers are valid,
  which allowed local users to cause a denial of service (NULL pointer
  dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call
  (bnc#949936 951638).
- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c
  in the Linux kernel allowed local users to cause a denial of service
  (OOPS) via crafted keyctl commands (bnc#951440).
- CVE-2015-7884: The vivid_fb_ioctl function in
  drivers/media/platform/vivid/vivid-osd.c in the Linux kernel did not
  initialize a certain structure member, which allowed local users to
  obtain sensitive information from kernel memory via a crafted application
  (bnc#951626).
- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS
  users to cause a denial of service (host OS panic or hang) by triggering
  many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).
- CVE-2015-8709: kernel/ptrace.c in the Linux kernel mishandled uid and
  gid mappings, which allowed local users to gain privileges by establishing
  a user namespace, waiting for a root process to enter that namespace
  with an unsafe uid or gid, and then using the ptrace system call.  NOTE:
  the vendor states 'there is no kernel bug here (bnc#959709).
- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not
  properly manage the relationship between a lock and a socket, which
  allowed local users to cause a denial of service (deadlock) via a crafted
  sctp_accept call. (bsc#961509)
- CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c
  in the Linux kernel allowed local users to cause a denial of service
  (infinite loop) via a writev system call that triggers a zero length
  for the first segment of an iov (bnc#963765).
- CVE-2015-8787: The nf_nat_redirect_ipv4 function in
  net/netfilter/nf_nat_redirect.c in the Linux kernel allowed remote
  attackers to cause a denial of service (NULL pointer dereference and
  system crash) or possibly have unspecified other impact by sending
  certain IPv4 packets to an incompletely configured interface, a related
  issue to CVE-2003-1604 (bnc#963931).
- CVE-2015-8812: A flaw was found in the CXGB3 kernel driver when
  the network was considered congested.  The kernel would incorrectly
  misinterpret the congestion as an error condition and incorrectly
  free/clean up the skb. When the device would then send the skb's
  queued, these structures would be referenced and may panic the system
  or allow an attacker to escalate privileges in a use-after-free
  scenario. (bsc#966437).
- CVE-2016-0723: Race condition in the tty_ioctl function in
  drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain
  sensitive information from kernel memory or cause a denial of service
  (use-after-free and system crash) by making a TIOCGETD ioctl call during
  processing of a TIOCSETD ioctl call (bnc#961500).
- CVE-2016-2069: When Linux invalidated a paging structure that is
  not in use locally, it could, in principle, race against another
  CPU that is switching to a process that uses the paging structure in
  question. (bsc#963767)
- CVE-2016-2184: A malicious USB device could cause a kernel crash in
  the alsa usb-audio driver. (bsc#971125)
- CVE-2016-2383: Incorrect branch fixups for eBPF allow arbitrary read
  of kernel memory. (bsc#966684)
- CVE-2016-2384: A malicious USB device could cause a kernel crash in
  the alsa usb-audio driver. (bsc#966693)

The following non-security bugs were fixed:
- alsa: hda - Apply clock gate workaround to Skylake, too (bsc#966137).
- alsa: hda - disable dynamic clock gating on Broxton before reset (bsc#966137).
- alsa: hda - Fix playback noise with 24/32 bit sample size on BXT (bsc#966137).
- alsa: seq: Fix double port list deletion (bsc#968018).
- alsa: seq: Fix leak of pool buffer at concurrent writes (bsc#968018).
- alsa: timer: Fix race between stop and interrupt (bsc#968018).
- alsa: timer: Fix wrong instance passed to slave callbacks (bsc#968018).
- arm64: Add workaround for Cavium erratum 27456.
- arm64: Backport arm64 patches from SLE12-SP1-ARM
- btrfs: teach backref walking about backrefs with underflowed (bsc#966259).
- cgroup kabi fix for 4.1.19.
- config: Disable CONFIG_DDR. CONFIG_DDR is selected automatically by drivers which need it.
- config: Disable MFD_TPS65218 The TPS65218 is a power management IC for 32-bit ARM systems.
- config: Modularize NF_REJECT_IPV4/V6 There is no reason why these helper modules should be built-in when the rest of netfilter is built as modules.
- config: Update x86 config files: Enable Intel RAPL This driver is useful when power caping is needed. It was enabled in the SLE kernel 2 years ago.
- Delete patches.fixes/bridge-module-get-put.patch. As discussed in http://lists.opensuse.org/opensuse-kernel/2015-11/msg00046.html
- drm/i915: Fix double unref in intelfb_alloc failure path (boo#962866, boo#966179).
- drm/i915: Fix failure paths around initial fbdev allocation (boo#962866, boo#966179).
- drm/i915: Pin the ifbdev for the info-&amp;gt;system_base GGTT mmapping (boo#962866, boo#966179).
- e1000e: Avoid divide by zero error (bsc#965125).
- e1000e: fix division by zero on jumbo MTUs (bsc#965125).
- e1000e: fix systim issues (bsc#965125).
- e1000e: Fix tight loop implementation of systime read algorithm (bsc#965125).
- ibmvnic: Fix ibmvnic_capability struct.
- intel: Disable Skylake support in intel_idle driver again (boo#969582) This turned out to bring a regression on some machines, unfortunately. It should be addressed in the upstream at first.
- intel_idle: allow idle states to be freeze-mode specific (boo#969582).
- intel_idle: Skylake Client Support (boo#969582).
- intel_idle: Skylake Client Support - updated (boo#969582).
- libceph: fix scatterlist last_piece calculation (bsc#963746).
- lio: Add LIO clustered RBD backend (fate#318836)
- net kabi fixes for 4.1.19.
- numa patches updated to v15
- ocfs2: fix dlmglue deadlock issue(bnc#962257)
- pci: thunder: Add driver for ThunderX-pass{1,2} on-chip devices
- pci: thunder: Add PCIe host driver for ThunderX processors
- sd: Optimal I/O size is in bytes, not sectors (boo#961263).
- sd: Reject optimal transfer length smaller than page size (boo#961263).
- series.conf: move cxgb3 patch to network drivers section
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:1008-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-4.1.20-11.1">
      <FullProductName ProductID="kernel-debug-4.1.20-11.1">kernel-debug-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-base-4.1.20-11.1">
      <FullProductName ProductID="kernel-debug-base-4.1.20-11.1">kernel-debug-base-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-devel-4.1.20-11.1">
      <FullProductName ProductID="kernel-debug-devel-4.1.20-11.1">kernel-debug-devel-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-4.1.20-11.1">
      <FullProductName ProductID="kernel-default-4.1.20-11.1">kernel-default-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-4.1.20-11.1">
      <FullProductName ProductID="kernel-default-base-4.1.20-11.1">kernel-default-base-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-4.1.20-11.1">
      <FullProductName ProductID="kernel-default-devel-4.1.20-11.1">kernel-default-devel-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-4.1.20-11.1">
      <FullProductName ProductID="kernel-devel-4.1.20-11.1">kernel-devel-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-4.1.20-11.3">
      <FullProductName ProductID="kernel-docs-4.1.20-11.3">kernel-docs-4.1.20-11.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-html-4.1.20-11.3">
      <FullProductName ProductID="kernel-docs-html-4.1.20-11.3">kernel-docs-html-4.1.20-11.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-pdf-4.1.20-11.3">
      <FullProductName ProductID="kernel-docs-pdf-4.1.20-11.3">kernel-docs-pdf-4.1.20-11.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-4.1.20-11.1">
      <FullProductName ProductID="kernel-ec2-4.1.20-11.1">kernel-ec2-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-base-4.1.20-11.1">
      <FullProductName ProductID="kernel-ec2-base-4.1.20-11.1">kernel-ec2-base-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-devel-4.1.20-11.1">
      <FullProductName ProductID="kernel-ec2-devel-4.1.20-11.1">kernel-ec2-devel-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-macros-4.1.20-11.1">
      <FullProductName ProductID="kernel-macros-4.1.20-11.1">kernel-macros-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-build-4.1.20-11.2">
      <FullProductName ProductID="kernel-obs-build-4.1.20-11.2">kernel-obs-build-4.1.20-11.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-qa-4.1.20-11.1">
      <FullProductName ProductID="kernel-obs-qa-4.1.20-11.1">kernel-obs-qa-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-qa-xen-4.1.20-11.1">
      <FullProductName ProductID="kernel-obs-qa-xen-4.1.20-11.1">kernel-obs-qa-xen-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-4.1.20-11.1">
      <FullProductName ProductID="kernel-pae-4.1.20-11.1">kernel-pae-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-base-4.1.20-11.1">
      <FullProductName ProductID="kernel-pae-base-4.1.20-11.1">kernel-pae-base-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-devel-4.1.20-11.1">
      <FullProductName ProductID="kernel-pae-devel-4.1.20-11.1">kernel-pae-devel-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pv-4.1.20-11.1">
      <FullProductName ProductID="kernel-pv-4.1.20-11.1">kernel-pv-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pv-base-4.1.20-11.1">
      <FullProductName ProductID="kernel-pv-base-4.1.20-11.1">kernel-pv-base-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pv-devel-4.1.20-11.1">
      <FullProductName ProductID="kernel-pv-devel-4.1.20-11.1">kernel-pv-devel-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-4.1.20-11.1">
      <FullProductName ProductID="kernel-source-4.1.20-11.1">kernel-source-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-vanilla-4.1.20-11.1">
      <FullProductName ProductID="kernel-source-vanilla-4.1.20-11.1">kernel-source-vanilla-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-4.1.20-11.1">
      <FullProductName ProductID="kernel-syms-4.1.20-11.1">kernel-syms-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-4.1.20-11.1">
      <FullProductName ProductID="kernel-vanilla-4.1.20-11.1">kernel-vanilla-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-devel-4.1.20-11.1">
      <FullProductName ProductID="kernel-vanilla-devel-4.1.20-11.1">kernel-vanilla-devel-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-4.1.20-11.1">
      <FullProductName ProductID="kernel-xen-4.1.20-11.1">kernel-xen-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-base-4.1.20-11.1">
      <FullProductName ProductID="kernel-xen-base-4.1.20-11.1">kernel-xen-base-4.1.20-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-devel-4.1.20-11.1">
      <FullProductName ProductID="kernel-xen-devel-4.1.20-11.1">kernel-xen-devel-4.1.20-11.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-debug-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-debug-4.1.20-11.1">kernel-debug-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-debug-base-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-debug-base-4.1.20-11.1">kernel-debug-base-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-debug-devel-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-debug-devel-4.1.20-11.1">kernel-debug-devel-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-default-4.1.20-11.1">kernel-default-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-default-base-4.1.20-11.1">kernel-default-base-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-default-devel-4.1.20-11.1">kernel-default-devel-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-devel-4.1.20-11.1">kernel-devel-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-4.1.20-11.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-docs-4.1.20-11.3">kernel-docs-4.1.20-11.3 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-html-4.1.20-11.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-docs-html-4.1.20-11.3">kernel-docs-html-4.1.20-11.3 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-pdf-4.1.20-11.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-docs-pdf-4.1.20-11.3">kernel-docs-pdf-4.1.20-11.3 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-ec2-4.1.20-11.1">kernel-ec2-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-base-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-ec2-base-4.1.20-11.1">kernel-ec2-base-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-devel-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-ec2-devel-4.1.20-11.1">kernel-ec2-devel-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-macros-4.1.20-11.1">kernel-macros-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-build-4.1.20-11.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-obs-build-4.1.20-11.2">kernel-obs-build-4.1.20-11.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-qa-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-obs-qa-4.1.20-11.1">kernel-obs-qa-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-qa-xen-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.20-11.1">kernel-obs-qa-xen-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pae-4.1.20-11.1">kernel-pae-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-base-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pae-base-4.1.20-11.1">kernel-pae-base-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-devel-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pae-devel-4.1.20-11.1">kernel-pae-devel-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pv-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pv-4.1.20-11.1">kernel-pv-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pv-base-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pv-base-4.1.20-11.1">kernel-pv-base-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pv-devel-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pv-devel-4.1.20-11.1">kernel-pv-devel-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-source-4.1.20-11.1">kernel-source-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-vanilla-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-source-vanilla-4.1.20-11.1">kernel-source-vanilla-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-syms-4.1.20-11.1">kernel-syms-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-vanilla-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-vanilla-4.1.20-11.1">kernel-vanilla-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-vanilla-devel-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-vanilla-devel-4.1.20-11.1">kernel-vanilla-devel-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-xen-4.1.20-11.1">kernel-xen-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-base-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-xen-base-4.1.20-11.1">kernel-xen-base-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-devel-4.1.20-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-xen-devel-4.1.20-11.1">kernel-xen-devel-4.1.20-11.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the cuse_channel_release function in fs/fuse/cuse.c in the Linux kernel before 4.4 allows local users to cause a denial of service (memory consumption) or possibly have unspecified other impact by opening /dev/cuse many times.</Note>
    </Notes>
    <CVE>CVE-2015-1339</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.20-11.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.20-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1339.html</URL>
        <Description>CVE-2015-1339</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969356</URL>
        <Description>SUSE Bug 969356</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.</Note>
    </Notes>
    <CVE>CVE-2015-7799</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.20-11.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.20-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7799.html</URL>
        <Description>CVE-2015-7799</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052256</URL>
        <Description>SUSE Bug 1052256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/949936</URL>
        <Description>SUSE Bug 949936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951638</URL>
        <Description>SUSE Bug 951638</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.</Note>
    </Notes>
    <CVE>CVE-2015-7872</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.20-11.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.20-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7872.html</URL>
        <Description>CVE-2015-7872</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951440</URL>
        <Description>SUSE Bug 951440</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951542</URL>
        <Description>SUSE Bug 951542</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951638</URL>
        <Description>SUSE Bug 951638</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958463</URL>
        <Description>SUSE Bug 958463</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The vivid_fb_ioctl function in drivers/media/platform/vivid/vivid-osd.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.</Note>
    </Notes>
    <CVE>CVE-2015-7884</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.20-11.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.20-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.7</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7884.html</URL>
        <Description>CVE-2015-7884</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126909</URL>
        <Description>SUSE Bug 1126909</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951626</URL>
        <Description>SUSE Bug 951626</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951627</URL>
        <Description>SUSE Bug 951627</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.</Note>
    </Notes>
    <CVE>CVE-2015-8104</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.20-11.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.20-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8104.html</URL>
        <Description>CVE-2015-8104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/953527</URL>
        <Description>SUSE Bug 953527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954018</URL>
        <Description>SUSE Bug 954018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954404</URL>
        <Description>SUSE Bug 954404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954405</URL>
        <Description>SUSE Bug 954405</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962977</URL>
        <Description>SUSE Bug 962977</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED ** kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call.  NOTE: the vendor states "there is no kernel bug here."</Note>
    </Notes>
    <CVE>CVE-2015-8709</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.20-11.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.20-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8709.html</URL>
        <Description>CVE-2015-8709</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010933</URL>
        <Description>SUSE Bug 1010933</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959709</URL>
        <Description>SUSE Bug 959709</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960561</URL>
        <Description>SUSE Bug 960561</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960563</URL>
        <Description>SUSE Bug 960563</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">net/sctp/sm_sideeffect.c in the Linux kernel before 4.3 does not properly manage the relationship between a lock and a socket, which allows local users to cause a denial of service (deadlock) via a crafted sctp_accept call.</Note>
    </Notes>
    <CVE>CVE-2015-8767</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.20-11.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.20-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8767.html</URL>
        <Description>CVE-2015-8767</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961509</URL>
        <Description>SUSE Bug 961509</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel before 4.4 allows local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov.</Note>
    </Notes>
    <CVE>CVE-2015-8785</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.20-11.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.20-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.7</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8785.html</URL>
        <Description>CVE-2015-8785</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963765</URL>
        <Description>SUSE Bug 963765</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The nf_nat_redirect_ipv4 function in net/netfilter/nf_nat_redirect.c in the Linux kernel before 4.4 allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by sending certain IPv4 packets to an incompletely configured interface, a related issue to CVE-2003-1604.</Note>
    </Notes>
    <CVE>CVE-2015-8787</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.20-11.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.20-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8787.html</URL>
        <Description>CVE-2015-8787</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963931</URL>
        <Description>SUSE Bug 963931</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before 4.5 does not properly identify error conditions, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets.</Note>
    </Notes>
    <CVE>CVE-2015-8812</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.20-11.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.20-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8812.html</URL>
        <Description>CVE-2015-8812</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/966437</URL>
        <Description>SUSE Bug 966437</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/966683</URL>
        <Description>SUSE Bug 966683</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call.</Note>
    </Notes>
    <CVE>CVE-2016-0723</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.20-11.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.20-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0723.html</URL>
        <Description>CVE-2016-0723</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961500</URL>
        <Description>SUSE Bug 961500</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 allows local users to gain privileges by triggering access to a paging structure by a different CPU.</Note>
    </Notes>
    <CVE>CVE-2016-2069</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.20-11.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.20-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2069.html</URL>
        <Description>CVE-2016-2069</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/870618</URL>
        <Description>SUSE Bug 870618</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963767</URL>
        <Description>SUSE Bug 963767</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor.</Note>
    </Notes>
    <CVE>CVE-2016-2184</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.20-11.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.20-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2184.html</URL>
        <Description>CVE-2016-2184</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971125</URL>
        <Description>SUSE Bug 971125</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The adjust_branches function in kernel/bpf/verifier.c in the Linux kernel before 4.5 does not consider the delta in the backward-jump case, which allows local users to obtain sensitive information from kernel memory by creating a packet filter and then loading crafted BPF instructions.</Note>
    </Notes>
    <CVE>CVE-2016-2383</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.20-11.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.20-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2383.html</URL>
        <Description>CVE-2016-2383</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/966684</URL>
        <Description>SUSE Bug 966684</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.</Note>
    </Notes>
    <CVE>CVE-2016-2384</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.20-11.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.20-11.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.20-11.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.20-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2384.html</URL>
        <Description>CVE-2016-2384</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/966693</URL>
        <Description>SUSE Bug 966693</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967773</URL>
        <Description>SUSE Bug 967773</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
