<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:3058-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-12-08T11:01:24Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-12-08T11:01:24Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-12-08T11:01:24Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">

The openSUSE Leap 42.1 kernel was updated to 4.1.36 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012754).
- CVE-2016-9794: A use-after-free in ALSA pcm could lead to crashes or allowed local users to potentially gain privileges (bsc#1013533).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-9178: The __get_user_asm_ex macro in arch/x86/include/asm/uaccess.h in the Linux kernel did not initialize a certain integer variable, which allowed local users to obtain sensitive information from kernel stack memory by triggering failure of a get_user_ex call (bnc#1008650).
- CVE-2016-7913: The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure (bnc#1010478).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685).
- CVE-2015-8963: Race condition in kernel/events/core.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation (bnc#1010502).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data (bnc#1010150).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel in certain unusual hardware configurations, allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).
- CVE-2016-8630: The x86_decode_insn function in arch/x86/kvm/emulate.c in the Linux kernel, when KVM is enabled, allowed local users to cause a denial of service (host OS crash) via a certain use of a ModR/M byte in an undefined instruction (bnc#1009222).
- CVE-2016-9083: drivers/vfio/pci/vfio_pci.c in the Linux kernel allowed local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a 'state machine confusion bug (bnc#1007197).
- CVE-2016-9084: drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel misuses the kzalloc function, which allowed local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file (bnc#1007197).
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).
- CVE-2016-7097: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).
- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).

The following non-security bugs were fixed:

- ata: ahci_xgene: dereferencing uninitialized pointer in probe (bsc#1006580).
- blacklist.conf: add some commits (bsc#1006580)
- bna: Add synchronization for tx ring (bsc#993739).
- bonding: set carrier off for devices created through netlink (bsc#999577).
- btrfs: deal with duplicates during extent_map insertion in btrfs_get_extent (bsc#1001171).
- btrfs: deal with existing encompassing extent map in btrfs_get_extent() (bsc#1001171).
- btrfs: fix extent tree corruption due to relocation (bsc#990384).
- btrfs: fix races on root_log_ctx lists (bsc#1007653).
- ext4: fix data exposure after a crash (bsc#1012876).
- ext4: fix reference counting bug on block allocation error (bsc#1012876).
- gre: Disable segmentation offloads w/ CSUM and we are encapsulated via FOU (bsc#1001486).
- gro: Allow tunnel stacking in the case of FOU/GUE (bsc#1001486).
- ipv6: send NEWLINK on RA managed/otherconf changes (bsc#934067).
- ipv6: send only one NEWLINK when RA causes changes (bsc#934067).
- isofs: Do not return EACCES for unknown filesystems (bsc#1012876).
- jbd2: fix checkpoint list cleanup (bsc#1012876).
- jbd2: Fix unreclaimed pages after truncate in data=journal mode (bsc#1010909).
- locking/static_key: Fix concurrent static_key_slow_inc() (bsc#1006580).
- mmc: Fix kabi breakage of mmc-block in 4.1.36 (stable-4.1.36).
- posix_acl: Added fix for f2fs.
- Revert 'kbuild: add -fno-PIE' (stable-4.1.36).
- Revert 'x86/mm: Expand the exception table logic to allow new handling options' (stable-4.1.36).
- tunnels: Remove encapsulation offloads on decap (bsc#1001486).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- vmxnet3: Wake queue from reset work (bsc#999907).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:3058-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="drbd-8.4.6-12.2">
      <FullProductName ProductID="drbd-8.4.6-12.2">drbd-8.4.6-12.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="drbd-kmp-default-8.4.6_k4.1.36_38-12.2">
      <FullProductName ProductID="drbd-kmp-default-8.4.6_k4.1.36_38-12.2">drbd-kmp-default-8.4.6_k4.1.36_38-12.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="drbd-kmp-pv-8.4.6_k4.1.36_38-12.2">
      <FullProductName ProductID="drbd-kmp-pv-8.4.6_k4.1.36_38-12.2">drbd-kmp-pv-8.4.6_k4.1.36_38-12.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="drbd-kmp-xen-8.4.6_k4.1.36_38-12.2">
      <FullProductName ProductID="drbd-kmp-xen-8.4.6_k4.1.36_38-12.2">drbd-kmp-xen-8.4.6_k4.1.36_38-12.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="hdjmod-1.28-28.2">
      <FullProductName ProductID="hdjmod-1.28-28.2">hdjmod-1.28-28.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="hdjmod-kmp-default-1.28_k4.1.36_38-28.2">
      <FullProductName ProductID="hdjmod-kmp-default-1.28_k4.1.36_38-28.2">hdjmod-kmp-default-1.28_k4.1.36_38-28.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="hdjmod-kmp-pae-1.28_k4.1.36_38-28.2">
      <FullProductName ProductID="hdjmod-kmp-pae-1.28_k4.1.36_38-28.2">hdjmod-kmp-pae-1.28_k4.1.36_38-28.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="hdjmod-kmp-pv-1.28_k4.1.36_38-28.2">
      <FullProductName ProductID="hdjmod-kmp-pv-1.28_k4.1.36_38-28.2">hdjmod-kmp-pv-1.28_k4.1.36_38-28.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="hdjmod-kmp-xen-1.28_k4.1.36_38-28.2">
      <FullProductName ProductID="hdjmod-kmp-xen-1.28_k4.1.36_38-28.2">hdjmod-kmp-xen-1.28_k4.1.36_38-28.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ipset-6.25.1-9.2">
      <FullProductName ProductID="ipset-6.25.1-9.2">ipset-6.25.1-9.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ipset-devel-6.25.1-9.2">
      <FullProductName ProductID="ipset-devel-6.25.1-9.2">ipset-devel-6.25.1-9.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ipset-kmp-default-6.25.1_k4.1.36_38-9.2">
      <FullProductName ProductID="ipset-kmp-default-6.25.1_k4.1.36_38-9.2">ipset-kmp-default-6.25.1_k4.1.36_38-9.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ipset-kmp-pae-6.25.1_k4.1.36_38-9.2">
      <FullProductName ProductID="ipset-kmp-pae-6.25.1_k4.1.36_38-9.2">ipset-kmp-pae-6.25.1_k4.1.36_38-9.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ipset-kmp-pv-6.25.1_k4.1.36_38-9.2">
      <FullProductName ProductID="ipset-kmp-pv-6.25.1_k4.1.36_38-9.2">ipset-kmp-pv-6.25.1_k4.1.36_38-9.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ipset-kmp-xen-6.25.1_k4.1.36_38-9.2">
      <FullProductName ProductID="ipset-kmp-xen-6.25.1_k4.1.36_38-9.2">ipset-kmp-xen-6.25.1_k4.1.36_38-9.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-4.1.36-38.1">
      <FullProductName ProductID="kernel-debug-4.1.36-38.1">kernel-debug-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-base-4.1.36-38.1">
      <FullProductName ProductID="kernel-debug-base-4.1.36-38.1">kernel-debug-base-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-devel-4.1.36-38.1">
      <FullProductName ProductID="kernel-debug-devel-4.1.36-38.1">kernel-debug-devel-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-4.1.36-38.1">
      <FullProductName ProductID="kernel-default-4.1.36-38.1">kernel-default-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-4.1.36-38.1">
      <FullProductName ProductID="kernel-default-base-4.1.36-38.1">kernel-default-base-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-4.1.36-38.1">
      <FullProductName ProductID="kernel-default-devel-4.1.36-38.1">kernel-default-devel-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-4.1.36-38.1">
      <FullProductName ProductID="kernel-devel-4.1.36-38.1">kernel-devel-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-4.1.36-38.2">
      <FullProductName ProductID="kernel-docs-4.1.36-38.2">kernel-docs-4.1.36-38.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-html-4.1.36-38.2">
      <FullProductName ProductID="kernel-docs-html-4.1.36-38.2">kernel-docs-html-4.1.36-38.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-pdf-4.1.36-38.2">
      <FullProductName ProductID="kernel-docs-pdf-4.1.36-38.2">kernel-docs-pdf-4.1.36-38.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-4.1.36-38.1">
      <FullProductName ProductID="kernel-ec2-4.1.36-38.1">kernel-ec2-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-base-4.1.36-38.1">
      <FullProductName ProductID="kernel-ec2-base-4.1.36-38.1">kernel-ec2-base-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-devel-4.1.36-38.1">
      <FullProductName ProductID="kernel-ec2-devel-4.1.36-38.1">kernel-ec2-devel-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-macros-4.1.36-38.1">
      <FullProductName ProductID="kernel-macros-4.1.36-38.1">kernel-macros-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-build-4.1.36-38.2">
      <FullProductName ProductID="kernel-obs-build-4.1.36-38.2">kernel-obs-build-4.1.36-38.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-qa-4.1.36-38.1">
      <FullProductName ProductID="kernel-obs-qa-4.1.36-38.1">kernel-obs-qa-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-4.1.36-38.1">
      <FullProductName ProductID="kernel-pae-4.1.36-38.1">kernel-pae-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-base-4.1.36-38.1">
      <FullProductName ProductID="kernel-pae-base-4.1.36-38.1">kernel-pae-base-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-devel-4.1.36-38.1">
      <FullProductName ProductID="kernel-pae-devel-4.1.36-38.1">kernel-pae-devel-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pv-4.1.36-38.1">
      <FullProductName ProductID="kernel-pv-4.1.36-38.1">kernel-pv-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pv-base-4.1.36-38.1">
      <FullProductName ProductID="kernel-pv-base-4.1.36-38.1">kernel-pv-base-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pv-devel-4.1.36-38.1">
      <FullProductName ProductID="kernel-pv-devel-4.1.36-38.1">kernel-pv-devel-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-4.1.36-38.1">
      <FullProductName ProductID="kernel-source-4.1.36-38.1">kernel-source-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-vanilla-4.1.36-38.1">
      <FullProductName ProductID="kernel-source-vanilla-4.1.36-38.1">kernel-source-vanilla-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-4.1.36-38.1">
      <FullProductName ProductID="kernel-syms-4.1.36-38.1">kernel-syms-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-4.1.36-38.1">
      <FullProductName ProductID="kernel-vanilla-4.1.36-38.1">kernel-vanilla-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-devel-4.1.36-38.1">
      <FullProductName ProductID="kernel-vanilla-devel-4.1.36-38.1">kernel-vanilla-devel-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-4.1.36-38.1">
      <FullProductName ProductID="kernel-xen-4.1.36-38.1">kernel-xen-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-base-4.1.36-38.1">
      <FullProductName ProductID="kernel-xen-base-4.1.36-38.1">kernel-xen-base-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-devel-4.1.36-38.1">
      <FullProductName ProductID="kernel-xen-devel-4.1.36-38.1">kernel-xen-devel-4.1.36-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libipset3-6.25.1-9.2">
      <FullProductName ProductID="libipset3-6.25.1-9.2">libipset3-6.25.1-9.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="lttng-modules-2.7.0-6.2">
      <FullProductName ProductID="lttng-modules-2.7.0-6.2">lttng-modules-2.7.0-6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2">
      <FullProductName ProductID="lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2">lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2">
      <FullProductName ProductID="lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2">lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pcfclock-0.44-270.2">
      <FullProductName ProductID="pcfclock-0.44-270.2">pcfclock-0.44-270.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pcfclock-kmp-default-0.44_k4.1.36_38-270.2">
      <FullProductName ProductID="pcfclock-kmp-default-0.44_k4.1.36_38-270.2">pcfclock-kmp-default-0.44_k4.1.36_38-270.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pcfclock-kmp-pae-0.44_k4.1.36_38-270.2">
      <FullProductName ProductID="pcfclock-kmp-pae-0.44_k4.1.36_38-270.2">pcfclock-kmp-pae-0.44_k4.1.36_38-270.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pcfclock-kmp-pv-0.44_k4.1.36_38-270.2">
      <FullProductName ProductID="pcfclock-kmp-pv-0.44_k4.1.36_38-270.2">pcfclock-kmp-pv-0.44_k4.1.36_38-270.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vhba-kmp-20140928-9.2">
      <FullProductName ProductID="vhba-kmp-20140928-9.2">vhba-kmp-20140928-9.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vhba-kmp-default-20140928_k4.1.36_38-9.2">
      <FullProductName ProductID="vhba-kmp-default-20140928_k4.1.36_38-9.2">vhba-kmp-default-20140928_k4.1.36_38-9.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vhba-kmp-pae-20140928_k4.1.36_38-9.2">
      <FullProductName ProductID="vhba-kmp-pae-20140928_k4.1.36_38-9.2">vhba-kmp-pae-20140928_k4.1.36_38-9.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vhba-kmp-pv-20140928_k4.1.36_38-9.2">
      <FullProductName ProductID="vhba-kmp-pv-20140928_k4.1.36_38-9.2">vhba-kmp-pv-20140928_k4.1.36_38-9.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vhba-kmp-xen-20140928_k4.1.36_38-9.2">
      <FullProductName ProductID="vhba-kmp-xen-20140928_k4.1.36_38-9.2">vhba-kmp-xen-20140928_k4.1.36_38-9.2</FullProductName>
    </Branch>
    <Relationship ProductReference="drbd-8.4.6-12.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:drbd-8.4.6-12.2">drbd-8.4.6-12.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="drbd-kmp-default-8.4.6_k4.1.36_38-12.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.36_38-12.2">drbd-kmp-default-8.4.6_k4.1.36_38-12.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="drbd-kmp-pv-8.4.6_k4.1.36_38-12.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.36_38-12.2">drbd-kmp-pv-8.4.6_k4.1.36_38-12.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="drbd-kmp-xen-8.4.6_k4.1.36_38-12.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.36_38-12.2">drbd-kmp-xen-8.4.6_k4.1.36_38-12.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="hdjmod-1.28-28.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:hdjmod-1.28-28.2">hdjmod-1.28-28.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="hdjmod-kmp-default-1.28_k4.1.36_38-28.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:hdjmod-kmp-default-1.28_k4.1.36_38-28.2">hdjmod-kmp-default-1.28_k4.1.36_38-28.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="hdjmod-kmp-pae-1.28_k4.1.36_38-28.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:hdjmod-kmp-pae-1.28_k4.1.36_38-28.2">hdjmod-kmp-pae-1.28_k4.1.36_38-28.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="hdjmod-kmp-pv-1.28_k4.1.36_38-28.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:hdjmod-kmp-pv-1.28_k4.1.36_38-28.2">hdjmod-kmp-pv-1.28_k4.1.36_38-28.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="hdjmod-kmp-xen-1.28_k4.1.36_38-28.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:hdjmod-kmp-xen-1.28_k4.1.36_38-28.2">hdjmod-kmp-xen-1.28_k4.1.36_38-28.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ipset-6.25.1-9.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:ipset-6.25.1-9.2">ipset-6.25.1-9.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ipset-devel-6.25.1-9.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:ipset-devel-6.25.1-9.2">ipset-devel-6.25.1-9.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ipset-kmp-default-6.25.1_k4.1.36_38-9.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:ipset-kmp-default-6.25.1_k4.1.36_38-9.2">ipset-kmp-default-6.25.1_k4.1.36_38-9.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ipset-kmp-pae-6.25.1_k4.1.36_38-9.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:ipset-kmp-pae-6.25.1_k4.1.36_38-9.2">ipset-kmp-pae-6.25.1_k4.1.36_38-9.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ipset-kmp-pv-6.25.1_k4.1.36_38-9.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:ipset-kmp-pv-6.25.1_k4.1.36_38-9.2">ipset-kmp-pv-6.25.1_k4.1.36_38-9.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ipset-kmp-xen-6.25.1_k4.1.36_38-9.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:ipset-kmp-xen-6.25.1_k4.1.36_38-9.2">ipset-kmp-xen-6.25.1_k4.1.36_38-9.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-debug-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-debug-4.1.36-38.1">kernel-debug-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-debug-base-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-debug-base-4.1.36-38.1">kernel-debug-base-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-debug-devel-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-debug-devel-4.1.36-38.1">kernel-debug-devel-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-default-4.1.36-38.1">kernel-default-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-default-base-4.1.36-38.1">kernel-default-base-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-default-devel-4.1.36-38.1">kernel-default-devel-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-devel-4.1.36-38.1">kernel-devel-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-4.1.36-38.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-docs-4.1.36-38.2">kernel-docs-4.1.36-38.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-html-4.1.36-38.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-docs-html-4.1.36-38.2">kernel-docs-html-4.1.36-38.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-pdf-4.1.36-38.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-docs-pdf-4.1.36-38.2">kernel-docs-pdf-4.1.36-38.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-ec2-4.1.36-38.1">kernel-ec2-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-base-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-ec2-base-4.1.36-38.1">kernel-ec2-base-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-devel-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-ec2-devel-4.1.36-38.1">kernel-ec2-devel-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-macros-4.1.36-38.1">kernel-macros-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-build-4.1.36-38.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-obs-build-4.1.36-38.2">kernel-obs-build-4.1.36-38.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-qa-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-obs-qa-4.1.36-38.1">kernel-obs-qa-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pae-4.1.36-38.1">kernel-pae-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-base-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pae-base-4.1.36-38.1">kernel-pae-base-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-devel-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pae-devel-4.1.36-38.1">kernel-pae-devel-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pv-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pv-4.1.36-38.1">kernel-pv-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pv-base-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pv-base-4.1.36-38.1">kernel-pv-base-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pv-devel-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pv-devel-4.1.36-38.1">kernel-pv-devel-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-source-4.1.36-38.1">kernel-source-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-vanilla-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-source-vanilla-4.1.36-38.1">kernel-source-vanilla-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-syms-4.1.36-38.1">kernel-syms-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-vanilla-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-vanilla-4.1.36-38.1">kernel-vanilla-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-vanilla-devel-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-vanilla-devel-4.1.36-38.1">kernel-vanilla-devel-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-xen-4.1.36-38.1">kernel-xen-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-base-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-xen-base-4.1.36-38.1">kernel-xen-base-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-devel-4.1.36-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-xen-devel-4.1.36-38.1">kernel-xen-devel-4.1.36-38.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libipset3-6.25.1-9.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libipset3-6.25.1-9.2">libipset3-6.25.1-9.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="lttng-modules-2.7.0-6.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:lttng-modules-2.7.0-6.2">lttng-modules-2.7.0-6.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2">lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2">lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="pcfclock-0.44-270.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:pcfclock-0.44-270.2">pcfclock-0.44-270.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="pcfclock-kmp-default-0.44_k4.1.36_38-270.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:pcfclock-kmp-default-0.44_k4.1.36_38-270.2">pcfclock-kmp-default-0.44_k4.1.36_38-270.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="pcfclock-kmp-pae-0.44_k4.1.36_38-270.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:pcfclock-kmp-pae-0.44_k4.1.36_38-270.2">pcfclock-kmp-pae-0.44_k4.1.36_38-270.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="pcfclock-kmp-pv-0.44_k4.1.36_38-270.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:pcfclock-kmp-pv-0.44_k4.1.36_38-270.2">pcfclock-kmp-pv-0.44_k4.1.36_38-270.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="vhba-kmp-20140928-9.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:vhba-kmp-20140928-9.2">vhba-kmp-20140928-9.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="vhba-kmp-default-20140928_k4.1.36_38-9.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:vhba-kmp-default-20140928_k4.1.36_38-9.2">vhba-kmp-default-20140928_k4.1.36_38-9.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="vhba-kmp-pae-20140928_k4.1.36_38-9.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:vhba-kmp-pae-20140928_k4.1.36_38-9.2">vhba-kmp-pae-20140928_k4.1.36_38-9.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="vhba-kmp-pv-20140928_k4.1.36_38-9.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:vhba-kmp-pv-20140928_k4.1.36_38-9.2">vhba-kmp-pv-20140928_k4.1.36_38-9.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="vhba-kmp-xen-20140928_k4.1.36_38-9.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:vhba-kmp-xen-20140928_k4.1.36_38-9.2">vhba-kmp-xen-20140928_k4.1.36_38-9.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.</Note>
    </Notes>
    <CVE>CVE-2015-8956</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:drbd-8.4.6-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-1.28-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-default-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pae-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pv-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-xen-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-devel-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-default-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pae-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pv-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-xen-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libipset3-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-2.7.0-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-0.44-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-default-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pae-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pv-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-20140928-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-default-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pae-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pv-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-xen-20140928_k4.1.36_38-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8956.html</URL>
        <Description>CVE-2015-8956</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003925</URL>
        <Description>SUSE Bug 1003925</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.</Note>
    </Notes>
    <CVE>CVE-2015-8962</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:drbd-8.4.6-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-1.28-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-default-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pae-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pv-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-xen-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-devel-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-default-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pae-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pv-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-xen-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libipset3-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-2.7.0-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-0.44-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-default-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pae-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pv-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-20140928-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-default-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pae-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pv-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-xen-20140928_k4.1.36_38-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.9</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8962.html</URL>
        <Description>CVE-2015-8962</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010501</URL>
        <Description>SUSE Bug 1010501</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.</Note>
    </Notes>
    <CVE>CVE-2015-8963</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:drbd-8.4.6-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-1.28-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-default-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pae-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pv-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-xen-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-devel-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-default-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pae-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pv-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-xen-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libipset3-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-2.7.0-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-0.44-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-default-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pae-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pv-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-20140928-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-default-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pae-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pv-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-xen-20140928_k4.1.36_38-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:P/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8963.html</URL>
        <Description>CVE-2015-8963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010502</URL>
        <Description>SUSE Bug 1010502</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.</Note>
    </Notes>
    <CVE>CVE-2015-8964</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:drbd-8.4.6-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-1.28-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-default-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pae-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pv-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-xen-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-devel-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-default-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pae-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pv-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-xen-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libipset3-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-2.7.0-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-0.44-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-default-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pae-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pv-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-20140928-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-default-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pae-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pv-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-xen-20140928_k4.1.36_38-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8964.html</URL>
        <Description>CVE-2015-8964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010507</URL>
        <Description>SUSE Bug 1010507</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1025354</URL>
        <Description>SUSE Bug 1025354</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.</Note>
    </Notes>
    <CVE>CVE-2016-7042</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:drbd-8.4.6-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-1.28-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-default-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pae-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pv-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-xen-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-devel-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-default-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pae-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pv-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-xen-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libipset3-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-2.7.0-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-0.44-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-default-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pae-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pv-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-20140928-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-default-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pae-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pv-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-xen-20140928_k4.1.36_38-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7042.html</URL>
        <Description>CVE-2016-7042</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004517</URL>
        <Description>SUSE Bug 1004517</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1025354</URL>
        <Description>SUSE Bug 1025354</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.</Note>
    </Notes>
    <CVE>CVE-2016-7097</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:drbd-8.4.6-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-1.28-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-default-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pae-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pv-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-xen-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-devel-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-default-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pae-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pv-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-xen-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libipset3-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-2.7.0-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-0.44-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-default-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pae-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pv-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-20140928-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-default-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pae-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pv-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-xen-20140928_k4.1.36_38-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7097.html</URL>
        <Description>CVE-2016-7097</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021258</URL>
        <Description>SUSE Bug 1021258</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052256</URL>
        <Description>SUSE Bug 1052256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/870618</URL>
        <Description>SUSE Bug 870618</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/995968</URL>
        <Description>SUSE Bug 995968</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure.</Note>
    </Notes>
    <CVE>CVE-2016-7913</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:drbd-8.4.6-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-1.28-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-default-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pae-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pv-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-xen-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-devel-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-default-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pae-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pv-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-xen-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libipset3-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-2.7.0-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-0.44-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-default-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pae-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pv-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-20140928-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-default-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pae-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pv-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-xen-20140928_k4.1.36_38-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7913.html</URL>
        <Description>CVE-2016-7913</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010478</URL>
        <Description>SUSE Bug 1010478</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1025354</URL>
        <Description>SUSE Bug 1025354</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The x86_decode_insn function in arch/x86/kvm/emulate.c in the Linux kernel before 4.8.7, when KVM is enabled, allows local users to cause a denial of service (host OS crash) via a certain use of a ModR/M byte in an undefined instruction.</Note>
    </Notes>
    <CVE>CVE-2016-8630</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:drbd-8.4.6-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-1.28-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-default-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pae-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pv-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-xen-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-devel-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-default-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pae-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pv-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-xen-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libipset3-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-2.7.0-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-0.44-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-default-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pae-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pv-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-20140928-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-default-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pae-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pv-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-xen-20140928_k4.1.36_38-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8630.html</URL>
        <Description>CVE-2016-8630</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009222</URL>
        <Description>SUSE Bug 1009222</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.</Note>
    </Notes>
    <CVE>CVE-2016-8633</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:drbd-8.4.6-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-1.28-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-default-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pae-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pv-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-xen-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-devel-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-default-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pae-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pv-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-xen-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libipset3-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-2.7.0-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-0.44-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-default-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pae-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pv-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-20140928-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-default-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pae-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pv-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-xen-20140928_k4.1.36_38-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8633.html</URL>
        <Description>CVE-2016-8633</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008833</URL>
        <Description>SUSE Bug 1008833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.</Note>
    </Notes>
    <CVE>CVE-2016-8646</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:drbd-8.4.6-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-1.28-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-default-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pae-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pv-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-xen-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-devel-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-default-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pae-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pv-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-xen-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libipset3-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-2.7.0-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-0.44-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-default-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pae-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pv-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-20140928-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-default-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pae-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pv-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-xen-20140928_k4.1.36_38-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8646.html</URL>
        <Description>CVE-2016-8646</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010150</URL>
        <Description>SUSE Bug 1010150</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.</Note>
    </Notes>
    <CVE>CVE-2016-8655</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:drbd-8.4.6-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-1.28-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-default-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pae-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pv-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-xen-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-devel-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-default-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pae-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pv-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-xen-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libipset3-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-2.7.0-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-0.44-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-default-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pae-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pv-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-20140928-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-default-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pae-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pv-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-xen-20140928_k4.1.36_38-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.6</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8655.html</URL>
        <Description>CVE-2016-8655</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012754</URL>
        <Description>SUSE Bug 1012754</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012759</URL>
        <Description>SUSE Bug 1012759</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013822</URL>
        <Description>SUSE Bug 1013822</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052365</URL>
        <Description>SUSE Bug 1052365</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/vfio/pci/vfio_pci.c in the Linux kernel through 4.8.11 allows local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a "state machine confusion bug."</Note>
    </Notes>
    <CVE>CVE-2016-9083</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:drbd-8.4.6-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-1.28-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-default-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pae-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pv-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-xen-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-devel-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-default-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pae-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pv-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-xen-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libipset3-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-2.7.0-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-0.44-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-default-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pae-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pv-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-20140928-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-default-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pae-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pv-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-xen-20140928_k4.1.36_38-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9083.html</URL>
        <Description>CVE-2016-9083</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007197</URL>
        <Description>SUSE Bug 1007197</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1025354</URL>
        <Description>SUSE Bug 1025354</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel through 4.8.11 misuses the kzalloc function, which allows local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file.</Note>
    </Notes>
    <CVE>CVE-2016-9084</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:drbd-8.4.6-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-1.28-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-default-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pae-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pv-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-xen-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-devel-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-default-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pae-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pv-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-xen-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libipset3-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-2.7.0-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-0.44-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-default-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pae-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pv-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-20140928-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-default-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pae-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pv-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-xen-20140928_k4.1.36_38-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9084.html</URL>
        <Description>CVE-2016-9084</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007197</URL>
        <Description>SUSE Bug 1007197</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1025354</URL>
        <Description>SUSE Bug 1025354</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The __get_user_asm_ex macro in arch/x86/include/asm/uaccess.h in the Linux kernel before 4.7.5 does not initialize a certain integer variable, which allows local users to obtain sensitive information from kernel stack memory by triggering failure of a get_user_ex call.</Note>
    </Notes>
    <CVE>CVE-2016-9178</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:drbd-8.4.6-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-1.28-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-default-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pae-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pv-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-xen-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-devel-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-default-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pae-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pv-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-xen-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libipset3-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-2.7.0-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-0.44-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-default-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pae-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pv-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-20140928-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-default-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pae-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pv-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-xen-20140928_k4.1.36_38-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9178.html</URL>
        <Description>CVE-2016-9178</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008650</URL>
        <Description>SUSE Bug 1008650</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012353</URL>
        <Description>SUSE Bug 1012353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.</Note>
    </Notes>
    <CVE>CVE-2016-9555</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:drbd-8.4.6-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-1.28-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-default-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pae-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pv-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-xen-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-devel-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-default-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pae-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pv-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-xen-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libipset3-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-2.7.0-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-0.44-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-default-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pae-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pv-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-20140928-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-default-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pae-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pv-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-xen-20140928_k4.1.36_38-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:C/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9555.html</URL>
        <Description>CVE-2016-9555</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011685</URL>
        <Description>SUSE Bug 1011685</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012183</URL>
        <Description>SUSE Bug 1012183</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START command.</Note>
    </Notes>
    <CVE>CVE-2016-9794</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:drbd-8.4.6-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.36_38-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-1.28-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-default-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pae-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-pv-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:hdjmod-kmp-xen-1.28_k4.1.36_38-28.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-devel-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-default-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pae-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-pv-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ipset-kmp-xen-6.25.1_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.36-38.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.36-38.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libipset3-6.25.1-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-2.7.0-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-0.44-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-default-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pae-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:pcfclock-kmp-pv-0.44_k4.1.36_38-270.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-20140928-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-default-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pae-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-pv-20140928_k4.1.36_38-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:vhba-kmp-xen-20140928_k4.1.36_38-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.6</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9794.html</URL>
        <Description>CVE-2016-9794</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013533</URL>
        <Description>SUSE Bug 1013533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013543</URL>
        <Description>SUSE Bug 1013543</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013604</URL>
        <Description>SUSE Bug 1013604</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
