<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:2584-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-10-21T11:12:51Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-10-21T11:12:51Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-10-21T11:12:51Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
The openSUSE 13.1 kernel was updated to fix bugs and security issues.

The following security bugs were fixed:

- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers
  to cause a denial of service (stack consumption and panic) or possibly
  have unspecified other impact by triggering use of the GRO path for
  packets with tunnel stacking, as demonstrated by interleaved IPv4 headers
  and GRE headers, a related issue to CVE-2016-7039 (bnc#1001486).
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed,
  which is reportedly exploited in the wild (bsc#1004418).

The following non-security bugs were fixed:

- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).
- tunnels: Do not apply GRO to multiple layers of encapsulation (bsc#1001486).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:2584-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="cloop-2.639-11.34.1">
      <FullProductName ProductID="cloop-2.639-11.34.1">cloop-2.639-11.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cloop-kmp-default-2.639_k3.12.62_55-11.34.1">
      <FullProductName ProductID="cloop-kmp-default-2.639_k3.12.62_55-11.34.1">cloop-kmp-default-2.639_k3.12.62_55-11.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cloop-kmp-desktop-2.639_k3.12.62_55-11.34.1">
      <FullProductName ProductID="cloop-kmp-desktop-2.639_k3.12.62_55-11.34.1">cloop-kmp-desktop-2.639_k3.12.62_55-11.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cloop-kmp-pae-2.639_k3.12.62_55-11.34.1">
      <FullProductName ProductID="cloop-kmp-pae-2.639_k3.12.62_55-11.34.1">cloop-kmp-pae-2.639_k3.12.62_55-11.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cloop-kmp-xen-2.639_k3.12.62_55-11.34.1">
      <FullProductName ProductID="cloop-kmp-xen-2.639_k3.12.62_55-11.34.1">cloop-kmp-xen-2.639_k3.12.62_55-11.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="crash-7.0.2-2.34.1">
      <FullProductName ProductID="crash-7.0.2-2.34.1">crash-7.0.2-2.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="crash-devel-7.0.2-2.34.1">
      <FullProductName ProductID="crash-devel-7.0.2-2.34.1">crash-devel-7.0.2-2.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="crash-doc-7.0.2-2.34.1">
      <FullProductName ProductID="crash-doc-7.0.2-2.34.1">crash-doc-7.0.2-2.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="crash-eppic-7.0.2-2.34.1">
      <FullProductName ProductID="crash-eppic-7.0.2-2.34.1">crash-eppic-7.0.2-2.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="crash-gcore-7.0.2-2.34.1">
      <FullProductName ProductID="crash-gcore-7.0.2-2.34.1">crash-gcore-7.0.2-2.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="crash-kmp-default-7.0.2_k3.12.62_55-2.34.1">
      <FullProductName ProductID="crash-kmp-default-7.0.2_k3.12.62_55-2.34.1">crash-kmp-default-7.0.2_k3.12.62_55-2.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="crash-kmp-desktop-7.0.2_k3.12.62_55-2.34.1">
      <FullProductName ProductID="crash-kmp-desktop-7.0.2_k3.12.62_55-2.34.1">crash-kmp-desktop-7.0.2_k3.12.62_55-2.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="crash-kmp-pae-7.0.2_k3.12.62_55-2.34.1">
      <FullProductName ProductID="crash-kmp-pae-7.0.2_k3.12.62_55-2.34.1">crash-kmp-pae-7.0.2_k3.12.62_55-2.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="crash-kmp-xen-7.0.2_k3.12.62_55-2.34.1">
      <FullProductName ProductID="crash-kmp-xen-7.0.2_k3.12.62_55-2.34.1">crash-kmp-xen-7.0.2_k3.12.62_55-2.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="hdjmod-1.28-16.34.1">
      <FullProductName ProductID="hdjmod-1.28-16.34.1">hdjmod-1.28-16.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="hdjmod-kmp-default-1.28_k3.12.62_55-16.34.1">
      <FullProductName ProductID="hdjmod-kmp-default-1.28_k3.12.62_55-16.34.1">hdjmod-kmp-default-1.28_k3.12.62_55-16.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="hdjmod-kmp-desktop-1.28_k3.12.62_55-16.34.1">
      <FullProductName ProductID="hdjmod-kmp-desktop-1.28_k3.12.62_55-16.34.1">hdjmod-kmp-desktop-1.28_k3.12.62_55-16.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="hdjmod-kmp-pae-1.28_k3.12.62_55-16.34.1">
      <FullProductName ProductID="hdjmod-kmp-pae-1.28_k3.12.62_55-16.34.1">hdjmod-kmp-pae-1.28_k3.12.62_55-16.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="hdjmod-kmp-xen-1.28_k3.12.62_55-16.34.1">
      <FullProductName ProductID="hdjmod-kmp-xen-1.28_k3.12.62_55-16.34.1">hdjmod-kmp-xen-1.28_k3.12.62_55-16.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ipset-6.21.1-2.38.1">
      <FullProductName ProductID="ipset-6.21.1-2.38.1">ipset-6.21.1-2.38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ipset-devel-6.21.1-2.38.1">
      <FullProductName ProductID="ipset-devel-6.21.1-2.38.1">ipset-devel-6.21.1-2.38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ipset-kmp-default-6.21.1_k3.12.62_55-2.38.1">
      <FullProductName ProductID="ipset-kmp-default-6.21.1_k3.12.62_55-2.38.1">ipset-kmp-default-6.21.1_k3.12.62_55-2.38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ipset-kmp-desktop-6.21.1_k3.12.62_55-2.38.1">
      <FullProductName ProductID="ipset-kmp-desktop-6.21.1_k3.12.62_55-2.38.1">ipset-kmp-desktop-6.21.1_k3.12.62_55-2.38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ipset-kmp-pae-6.21.1_k3.12.62_55-2.38.1">
      <FullProductName ProductID="ipset-kmp-pae-6.21.1_k3.12.62_55-2.38.1">ipset-kmp-pae-6.21.1_k3.12.62_55-2.38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ipset-kmp-xen-6.21.1_k3.12.62_55-2.38.1">
      <FullProductName ProductID="ipset-kmp-xen-6.21.1_k3.12.62_55-2.38.1">ipset-kmp-xen-6.21.1_k3.12.62_55-2.38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="iscsitarget-1.4.20.3-13.34.1">
      <FullProductName ProductID="iscsitarget-1.4.20.3-13.34.1">iscsitarget-1.4.20.3-13.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="iscsitarget-kmp-default-1.4.20.3_k3.12.62_55-13.34.1">
      <FullProductName ProductID="iscsitarget-kmp-default-1.4.20.3_k3.12.62_55-13.34.1">iscsitarget-kmp-default-1.4.20.3_k3.12.62_55-13.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="iscsitarget-kmp-desktop-1.4.20.3_k3.12.62_55-13.34.1">
      <FullProductName ProductID="iscsitarget-kmp-desktop-1.4.20.3_k3.12.62_55-13.34.1">iscsitarget-kmp-desktop-1.4.20.3_k3.12.62_55-13.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="iscsitarget-kmp-pae-1.4.20.3_k3.12.62_55-13.34.1">
      <FullProductName ProductID="iscsitarget-kmp-pae-1.4.20.3_k3.12.62_55-13.34.1">iscsitarget-kmp-pae-1.4.20.3_k3.12.62_55-13.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="iscsitarget-kmp-xen-1.4.20.3_k3.12.62_55-13.34.1">
      <FullProductName ProductID="iscsitarget-kmp-xen-1.4.20.3_k3.12.62_55-13.34.1">iscsitarget-kmp-xen-1.4.20.3_k3.12.62_55-13.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-3.12.62-55.1">
      <FullProductName ProductID="kernel-debug-3.12.62-55.1">kernel-debug-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-base-3.12.62-55.1">
      <FullProductName ProductID="kernel-debug-base-3.12.62-55.1">kernel-debug-base-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-devel-3.12.62-55.1">
      <FullProductName ProductID="kernel-debug-devel-3.12.62-55.1">kernel-debug-devel-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-3.12.62-55.1">
      <FullProductName ProductID="kernel-default-3.12.62-55.1">kernel-default-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-3.12.62-55.1">
      <FullProductName ProductID="kernel-default-base-3.12.62-55.1">kernel-default-base-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-3.12.62-55.1">
      <FullProductName ProductID="kernel-default-devel-3.12.62-55.1">kernel-default-devel-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-desktop-3.12.62-55.1">
      <FullProductName ProductID="kernel-desktop-3.12.62-55.1">kernel-desktop-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-desktop-base-3.12.62-55.1">
      <FullProductName ProductID="kernel-desktop-base-3.12.62-55.1">kernel-desktop-base-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-desktop-devel-3.12.62-55.1">
      <FullProductName ProductID="kernel-desktop-devel-3.12.62-55.1">kernel-desktop-devel-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-3.12.62-55.1">
      <FullProductName ProductID="kernel-devel-3.12.62-55.1">kernel-devel-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-3.12.62-55.2">
      <FullProductName ProductID="kernel-docs-3.12.62-55.2">kernel-docs-3.12.62-55.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-3.12.62-55.1">
      <FullProductName ProductID="kernel-ec2-3.12.62-55.1">kernel-ec2-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-base-3.12.62-55.1">
      <FullProductName ProductID="kernel-ec2-base-3.12.62-55.1">kernel-ec2-base-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-devel-3.12.62-55.1">
      <FullProductName ProductID="kernel-ec2-devel-3.12.62-55.1">kernel-ec2-devel-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-macros-3.12.62-55.1">
      <FullProductName ProductID="kernel-macros-3.12.62-55.1">kernel-macros-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-3.12.62-55.1">
      <FullProductName ProductID="kernel-pae-3.12.62-55.1">kernel-pae-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-base-3.12.62-55.1">
      <FullProductName ProductID="kernel-pae-base-3.12.62-55.1">kernel-pae-base-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-devel-3.12.62-55.1">
      <FullProductName ProductID="kernel-pae-devel-3.12.62-55.1">kernel-pae-devel-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-3.12.62-55.1">
      <FullProductName ProductID="kernel-source-3.12.62-55.1">kernel-source-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-vanilla-3.12.62-55.1">
      <FullProductName ProductID="kernel-source-vanilla-3.12.62-55.1">kernel-source-vanilla-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-3.12.62-55.1">
      <FullProductName ProductID="kernel-syms-3.12.62-55.1">kernel-syms-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-3.12.62-55.1">
      <FullProductName ProductID="kernel-trace-3.12.62-55.1">kernel-trace-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-base-3.12.62-55.1">
      <FullProductName ProductID="kernel-trace-base-3.12.62-55.1">kernel-trace-base-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-devel-3.12.62-55.1">
      <FullProductName ProductID="kernel-trace-devel-3.12.62-55.1">kernel-trace-devel-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-3.12.62-55.1">
      <FullProductName ProductID="kernel-vanilla-3.12.62-55.1">kernel-vanilla-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-devel-3.12.62-55.1">
      <FullProductName ProductID="kernel-vanilla-devel-3.12.62-55.1">kernel-vanilla-devel-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-3.12.62-55.1">
      <FullProductName ProductID="kernel-xen-3.12.62-55.1">kernel-xen-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-base-3.12.62-55.1">
      <FullProductName ProductID="kernel-xen-base-3.12.62-55.1">kernel-xen-base-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-devel-3.12.62-55.1">
      <FullProductName ProductID="kernel-xen-devel-3.12.62-55.1">kernel-xen-devel-3.12.62-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libipset3-6.21.1-2.38.1">
      <FullProductName ProductID="libipset3-6.21.1-2.38.1">libipset3-6.21.1-2.38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ndiswrapper-1.58-35.1">
      <FullProductName ProductID="ndiswrapper-1.58-35.1">ndiswrapper-1.58-35.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ndiswrapper-kmp-default-1.58_k3.12.62_55-35.1">
      <FullProductName ProductID="ndiswrapper-kmp-default-1.58_k3.12.62_55-35.1">ndiswrapper-kmp-default-1.58_k3.12.62_55-35.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ndiswrapper-kmp-desktop-1.58_k3.12.62_55-35.1">
      <FullProductName ProductID="ndiswrapper-kmp-desktop-1.58_k3.12.62_55-35.1">ndiswrapper-kmp-desktop-1.58_k3.12.62_55-35.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ndiswrapper-kmp-pae-1.58_k3.12.62_55-35.1">
      <FullProductName ProductID="ndiswrapper-kmp-pae-1.58_k3.12.62_55-35.1">ndiswrapper-kmp-pae-1.58_k3.12.62_55-35.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openvswitch-1.11.0-0.41.1">
      <FullProductName ProductID="openvswitch-1.11.0-0.41.1">openvswitch-1.11.0-0.41.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openvswitch-controller-1.11.0-0.41.1">
      <FullProductName ProductID="openvswitch-controller-1.11.0-0.41.1">openvswitch-controller-1.11.0-0.41.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openvswitch-kmp-default-1.11.0_k3.12.62_55-0.41.1">
      <FullProductName ProductID="openvswitch-kmp-default-1.11.0_k3.12.62_55-0.41.1">openvswitch-kmp-default-1.11.0_k3.12.62_55-0.41.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openvswitch-kmp-desktop-1.11.0_k3.12.62_55-0.41.1">
      <FullProductName ProductID="openvswitch-kmp-desktop-1.11.0_k3.12.62_55-0.41.1">openvswitch-kmp-desktop-1.11.0_k3.12.62_55-0.41.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openvswitch-kmp-pae-1.11.0_k3.12.62_55-0.41.1">
      <FullProductName ProductID="openvswitch-kmp-pae-1.11.0_k3.12.62_55-0.41.1">openvswitch-kmp-pae-1.11.0_k3.12.62_55-0.41.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openvswitch-kmp-xen-1.11.0_k3.12.62_55-0.41.1">
      <FullProductName ProductID="openvswitch-kmp-xen-1.11.0_k3.12.62_55-0.41.1">openvswitch-kmp-xen-1.11.0_k3.12.62_55-0.41.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openvswitch-pki-1.11.0-0.41.1">
      <FullProductName ProductID="openvswitch-pki-1.11.0-0.41.1">openvswitch-pki-1.11.0-0.41.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openvswitch-switch-1.11.0-0.41.1">
      <FullProductName ProductID="openvswitch-switch-1.11.0-0.41.1">openvswitch-switch-1.11.0-0.41.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openvswitch-test-1.11.0-0.41.1">
      <FullProductName ProductID="openvswitch-test-1.11.0-0.41.1">openvswitch-test-1.11.0-0.41.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pcfclock-0.44-258.35.1">
      <FullProductName ProductID="pcfclock-0.44-258.35.1">pcfclock-0.44-258.35.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pcfclock-kmp-default-0.44_k3.12.62_55-258.35.1">
      <FullProductName ProductID="pcfclock-kmp-default-0.44_k3.12.62_55-258.35.1">pcfclock-kmp-default-0.44_k3.12.62_55-258.35.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pcfclock-kmp-desktop-0.44_k3.12.62_55-258.35.1">
      <FullProductName ProductID="pcfclock-kmp-desktop-0.44_k3.12.62_55-258.35.1">pcfclock-kmp-desktop-0.44_k3.12.62_55-258.35.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pcfclock-kmp-pae-0.44_k3.12.62_55-258.35.1">
      <FullProductName ProductID="pcfclock-kmp-pae-0.44_k3.12.62_55-258.35.1">pcfclock-kmp-pae-0.44_k3.12.62_55-258.35.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python-openvswitch-1.11.0-0.41.1">
      <FullProductName ProductID="python-openvswitch-1.11.0-0.41.1">python-openvswitch-1.11.0-0.41.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python-openvswitch-test-1.11.0-0.41.1">
      <FullProductName ProductID="python-openvswitch-test-1.11.0-0.41.1">python-openvswitch-test-1.11.0-0.41.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python-virtualbox-4.2.36-2.66.1">
      <FullProductName ProductID="python-virtualbox-4.2.36-2.66.1">python-virtualbox-4.2.36-2.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vhba-kmp-20130607-2.34.1">
      <FullProductName ProductID="vhba-kmp-20130607-2.34.1">vhba-kmp-20130607-2.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vhba-kmp-default-20130607_k3.12.62_55-2.34.1">
      <FullProductName ProductID="vhba-kmp-default-20130607_k3.12.62_55-2.34.1">vhba-kmp-default-20130607_k3.12.62_55-2.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vhba-kmp-desktop-20130607_k3.12.62_55-2.34.1">
      <FullProductName ProductID="vhba-kmp-desktop-20130607_k3.12.62_55-2.34.1">vhba-kmp-desktop-20130607_k3.12.62_55-2.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vhba-kmp-pae-20130607_k3.12.62_55-2.34.1">
      <FullProductName ProductID="vhba-kmp-pae-20130607_k3.12.62_55-2.34.1">vhba-kmp-pae-20130607_k3.12.62_55-2.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vhba-kmp-xen-20130607_k3.12.62_55-2.34.1">
      <FullProductName ProductID="vhba-kmp-xen-20130607_k3.12.62_55-2.34.1">vhba-kmp-xen-20130607_k3.12.62_55-2.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-4.2.36-2.66.1">
      <FullProductName ProductID="virtualbox-4.2.36-2.66.1">virtualbox-4.2.36-2.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-devel-4.2.36-2.66.1">
      <FullProductName ProductID="virtualbox-devel-4.2.36-2.66.1">virtualbox-devel-4.2.36-2.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-guest-kmp-default-4.2.36_k3.12.62_55-2.66.1">
      <FullProductName ProductID="virtualbox-guest-kmp-default-4.2.36_k3.12.62_55-2.66.1">virtualbox-guest-kmp-default-4.2.36_k3.12.62_55-2.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-guest-kmp-desktop-4.2.36_k3.12.62_55-2.66.1">
      <FullProductName ProductID="virtualbox-guest-kmp-desktop-4.2.36_k3.12.62_55-2.66.1">virtualbox-guest-kmp-desktop-4.2.36_k3.12.62_55-2.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-guest-kmp-pae-4.2.36_k3.12.62_55-2.66.1">
      <FullProductName ProductID="virtualbox-guest-kmp-pae-4.2.36_k3.12.62_55-2.66.1">virtualbox-guest-kmp-pae-4.2.36_k3.12.62_55-2.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-guest-tools-4.2.36-2.66.1">
      <FullProductName ProductID="virtualbox-guest-tools-4.2.36-2.66.1">virtualbox-guest-tools-4.2.36-2.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-guest-x11-4.2.36-2.66.1">
      <FullProductName ProductID="virtualbox-guest-x11-4.2.36-2.66.1">virtualbox-guest-x11-4.2.36-2.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-host-kmp-default-4.2.36_k3.12.62_55-2.66.1">
      <FullProductName ProductID="virtualbox-host-kmp-default-4.2.36_k3.12.62_55-2.66.1">virtualbox-host-kmp-default-4.2.36_k3.12.62_55-2.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-host-kmp-desktop-4.2.36_k3.12.62_55-2.66.1">
      <FullProductName ProductID="virtualbox-host-kmp-desktop-4.2.36_k3.12.62_55-2.66.1">virtualbox-host-kmp-desktop-4.2.36_k3.12.62_55-2.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-host-kmp-pae-4.2.36_k3.12.62_55-2.66.1">
      <FullProductName ProductID="virtualbox-host-kmp-pae-4.2.36_k3.12.62_55-2.66.1">virtualbox-host-kmp-pae-4.2.36_k3.12.62_55-2.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-host-source-4.2.36-2.66.1">
      <FullProductName ProductID="virtualbox-host-source-4.2.36-2.66.1">virtualbox-host-source-4.2.36-2.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-qt-4.2.36-2.66.1">
      <FullProductName ProductID="virtualbox-qt-4.2.36-2.66.1">virtualbox-qt-4.2.36-2.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-websrv-4.2.36-2.66.1">
      <FullProductName ProductID="virtualbox-websrv-4.2.36-2.66.1">virtualbox-websrv-4.2.36-2.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-4.3.4_10-67.1">
      <FullProductName ProductID="xen-4.3.4_10-67.1">xen-4.3.4_10-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-devel-4.3.4_10-67.1">
      <FullProductName ProductID="xen-devel-4.3.4_10-67.1">xen-devel-4.3.4_10-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-doc-html-4.3.4_10-67.1">
      <FullProductName ProductID="xen-doc-html-4.3.4_10-67.1">xen-doc-html-4.3.4_10-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-default-4.3.4_10_k3.12.62_55-67.1">
      <FullProductName ProductID="xen-kmp-default-4.3.4_10_k3.12.62_55-67.1">xen-kmp-default-4.3.4_10_k3.12.62_55-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-desktop-4.3.4_10_k3.12.62_55-67.1">
      <FullProductName ProductID="xen-kmp-desktop-4.3.4_10_k3.12.62_55-67.1">xen-kmp-desktop-4.3.4_10_k3.12.62_55-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-pae-4.3.4_10_k3.12.62_55-67.1">
      <FullProductName ProductID="xen-kmp-pae-4.3.4_10_k3.12.62_55-67.1">xen-kmp-pae-4.3.4_10_k3.12.62_55-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-4.3.4_10-67.1">
      <FullProductName ProductID="xen-libs-4.3.4_10-67.1">xen-libs-4.3.4_10-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-32bit-4.3.4_10-67.1">
      <FullProductName ProductID="xen-libs-32bit-4.3.4_10-67.1">xen-libs-32bit-4.3.4_10-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-4.3.4_10-67.1">
      <FullProductName ProductID="xen-tools-4.3.4_10-67.1">xen-tools-4.3.4_10-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-domU-4.3.4_10-67.1">
      <FullProductName ProductID="xen-tools-domU-4.3.4_10-67.1">xen-tools-domU-4.3.4_10-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-xend-tools-4.3.4_10-67.1">
      <FullProductName ProductID="xen-xend-tools-4.3.4_10-67.1">xen-xend-tools-4.3.4_10-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xtables-addons-2.3-2.33.1">
      <FullProductName ProductID="xtables-addons-2.3-2.33.1">xtables-addons-2.3-2.33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xtables-addons-kmp-default-2.3_k3.12.62_55-2.33.1">
      <FullProductName ProductID="xtables-addons-kmp-default-2.3_k3.12.62_55-2.33.1">xtables-addons-kmp-default-2.3_k3.12.62_55-2.33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xtables-addons-kmp-desktop-2.3_k3.12.62_55-2.33.1">
      <FullProductName ProductID="xtables-addons-kmp-desktop-2.3_k3.12.62_55-2.33.1">xtables-addons-kmp-desktop-2.3_k3.12.62_55-2.33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xtables-addons-kmp-pae-2.3_k3.12.62_55-2.33.1">
      <FullProductName ProductID="xtables-addons-kmp-pae-2.3_k3.12.62_55-2.33.1">xtables-addons-kmp-pae-2.3_k3.12.62_55-2.33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xtables-addons-kmp-xen-2.3_k3.12.62_55-2.33.1">
      <FullProductName ProductID="xtables-addons-kmp-xen-2.3_k3.12.62_55-2.33.1">xtables-addons-kmp-xen-2.3_k3.12.62_55-2.33.1</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."</Note>
    </Notes>
    <CVE>CVE-2016-5195</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.6</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5195.html</URL>
        <Description>CVE-2016-5195</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004418</URL>
        <Description>SUSE Bug 1004418</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004419</URL>
        <Description>SUSE Bug 1004419</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004436</URL>
        <Description>SUSE Bug 1004436</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1006323</URL>
        <Description>SUSE Bug 1006323</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1006695</URL>
        <Description>SUSE Bug 1006695</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008110</URL>
        <Description>SUSE Bug 1008110</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1030118</URL>
        <Description>SUSE Bug 1030118</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1069496</URL>
        <Description>SUSE Bug 1069496</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149725</URL>
        <Description>SUSE Bug 1149725</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/870618</URL>
        <Description>SUSE Bug 870618</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986445</URL>
        <Description>SUSE Bug 986445</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/987565</URL>
        <Description>SUSE Bug 987565</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998689</URL>
        <Description>SUSE Bug 998689</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.</Note>
    </Notes>
    <CVE>CVE-2016-8666</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8666.html</URL>
        <Description>CVE-2016-8666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001486</URL>
        <Description>SUSE Bug 1001486</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001487</URL>
        <Description>SUSE Bug 1001487</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003964</URL>
        <Description>SUSE Bug 1003964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1025354</URL>
        <Description>SUSE Bug 1025354</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
