<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:0301-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-02-08T14:39:31Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-02-08T14:39:31Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-02-08T14:39:31Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">The openSUSE 13.1 kernel was updated to receive various security and bugfixes.

Following security bugs were fixed:
- CVE-2016-0728: A reference leak in keyring handling with
  join_session_keyring() could lead to local attackers gain root
  privileges. (bsc#962075).
- CVE-2015-7550: A local user could have triggered a race between read and
  revoke in keyctl (bnc#958951).
- CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions
  in drivers/net/ppp/pptp.c in the Linux kernel did not verify an address
  length, which allowed local users to obtain sensitive information from
  kernel memory and bypass the KASLR protection mechanism via a crafted
  application (bnc#959190).
- CVE-2015-8543: The networking implementation in the Linux kernel
  did not validate protocol identifiers for certain protocol families,
  which allowed local users to cause a denial of service (NULL function
  pointer dereference and system crash) or possibly gain privileges by
  leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application
  (bnc#958886).
- CVE-2014-8989: The Linux kernel did not properly restrict dropping
  of supplemental group memberships in certain namespace scenarios,
  which allowed local users to bypass intended file permissions by
  leveraging a POSIX ACL containing an entry for the group category
  that is more restrictive than the entry for the other category, aka a
  'negative groups' issue, related to kernel/groups.c, kernel/uid16.c,
  and kernel/user_namespace.c (bnc#906545).
- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on
  the x86_64 platform mishandles IRET faults in processing NMIs that
  occurred during userspace execution, which might allow local users to
  gain privileges by triggering an NMI (bnc#937969).
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in
  the Linux kernel through 4.2.3 did not ensure that certain slot numbers
  are valid, which allowed local users to cause a denial of service (NULL
  pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl
  call (bnc#949936).
- CVE-2015-8104: The KVM subsystem in the Linux kernel through 4.2.6,
  and Xen 4.3.x through 4.6.x, allowed guest OS users to cause a denial
  of service (host OS panic or hang) by triggering many #DB (aka Debug)
  exceptions, related to svm.c (bnc#954404).
- CVE-2015-5307: The KVM subsystem in the Linux kernel through 4.2.6,
  and Xen 4.3.x through 4.6.x, allowed guest OS users to cause a denial
  of service (host OS panic or hang) by triggering many #AC (aka Alignment
  Check) exceptions, related to svm.c and vmx.c (bnc#953527).
- CVE-2014-9529: Race condition in the key_gc_unused_keys function in
  security/keys/gc.c in the Linux kernel allowed local users to cause
  a denial of service (memory corruption or panic) or possibly have
  unspecified other impact via keyctl commands that trigger access to
  a key structure member during garbage collection of a key (bnc#912202).
- CVE-2015-7990: Race condition in the rds_sendmsg function in
  net/rds/sendmsg.c in the Linux kernel allowed local users to cause
  a denial of service (NULL pointer dereference and system crash) or
  possibly have unspecified other impact by using a socket that was not
  properly bound.  NOTE: this vulnerability exists because of an incomplete
  fix for CVE-2015-6937 (bnc#952384 953052).
- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c
  in the Linux kernel allowed local users to cause a denial of service
  (NULL pointer dereference and system crash) or possibly have unspecified
  other impact by using a socket that was not properly bound (bnc#945825).
- CVE-2015-7885: The dgnc_mgmt_ioctl function in
  drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 did
  not initialize a certain structure member, which allowed local users to
  obtain sensitive information from kernel memory via a crafted application
  (bnc#951627).
- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux
  kernel did not validate attempted changes to the MTU value, which allowed
  context-dependent attackers to cause a denial of service (packet loss)
  via a value that is (1) smaller than the minimum compliant value or
  (2) larger than the MTU of an interface, as demonstrated by a Router
  Advertisement (RA) message that is not validated by a daemon, a different
  vulnerability than CVE-2015-0272.  NOTE: the scope of CVE-2015-0272 is
  limited to the NetworkManager product (bnc#955354).
- CVE-2015-8767: A case can occur when sctp_accept() is called by the
  user during a heartbeat timeout event after the 4-way handshake. Since
  sctp_assoc_migrate() changes both assoc-&gt;base.sk and assoc-&gt;ep, the
  bh_sock_lock in sctp_generate_heartbeat_event() will be taken with the
  listening socket but released with the new association socket. The result
  is a deadlock on any future attempts to take the listening socket lock. (bsc#961509)
- CVE-2015-8575: Validate socket address length in sco_sock_bind() to
  prevent information leak (bsc#959399).
- CVE-2015-8551, CVE-2015-8552: xen/pciback: For
  XEN_PCI_OP_disable_msi[|x] only disable if device has MSI(X) enabled
  (bsc#957990).
- CVE-2015-8550: Compiler optimizations in the XEN PV backend drivers
  could have lead to double fetch vulnerabilities, causing denial of
  service or arbitrary code execution (depending on the configuration)
  (bsc#957988).

The following non-security bugs were fixed:
- ALSA: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).
- ALSA: hda - Fix noise problems on Thinkpad T440s (boo#958504).
- Input: aiptek - fix crash on detecting device without endpoints (bnc#956708).
- KEYS: Make /proc/keys unconditional if CONFIG_KEYS=y (boo#956934).
- KVM: x86: update masterclock values on TSC writes (bsc#961739).
- NFS: Fix a NULL pointer dereference of migration recovery ops for v4.2 client (bsc#960839).
- apparmor: allow SYS_CAP_RESOURCE to be sufficient to prlimit another task (bsc#921949).
- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).
- blktap: refine mm tracking (bsc#952976).
- cdrom: Random writing support for BD-RE media (bnc#959568).
- genksyms: Handle string literals with spaces in reference files (bsc#958510).
- ipv4: Do not increase PMTU with Datagram Too Big message (bsc#955224).
- ipv6: distinguish frag queues by device for multicast and link-local packets (bsc#955422).
- ipv6: fix tunnel error handling (bsc#952579).
- route: Use ipv4_mtu instead of raw rt_pmtu (bsc#955224).
- uas: Add response iu handling (bnc#954138).
- usbvision fix overflow of interfaces array (bnc#950998).
- x86/evtchn: make use of PHYSDEVOP_map_pirq.
- xen/pciback: Do not allow MSI-X ops if PCI_COMMAND_MEMORY is not set (bsc#957990 XSA-157).</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:0301-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="cloop-2.639-11.23.2">
      <FullProductName ProductID="cloop-2.639-11.23.2">cloop-2.639-11.23.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cloop-kmp-default-2.639_k3.11.10_34-11.23.2">
      <FullProductName ProductID="cloop-kmp-default-2.639_k3.11.10_34-11.23.2">cloop-kmp-default-2.639_k3.11.10_34-11.23.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cloop-kmp-desktop-2.639_k3.11.10_34-11.23.2">
      <FullProductName ProductID="cloop-kmp-desktop-2.639_k3.11.10_34-11.23.2">cloop-kmp-desktop-2.639_k3.11.10_34-11.23.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cloop-kmp-pae-2.639_k3.11.10_34-11.23.2">
      <FullProductName ProductID="cloop-kmp-pae-2.639_k3.11.10_34-11.23.2">cloop-kmp-pae-2.639_k3.11.10_34-11.23.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cloop-kmp-xen-2.639_k3.11.10_34-11.23.2">
      <FullProductName ProductID="cloop-kmp-xen-2.639_k3.11.10_34-11.23.2">cloop-kmp-xen-2.639_k3.11.10_34-11.23.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="crash-7.0.2-2.23.7">
      <FullProductName ProductID="crash-7.0.2-2.23.7">crash-7.0.2-2.23.7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="crash-devel-7.0.2-2.23.7">
      <FullProductName ProductID="crash-devel-7.0.2-2.23.7">crash-devel-7.0.2-2.23.7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="crash-doc-7.0.2-2.23.7">
      <FullProductName ProductID="crash-doc-7.0.2-2.23.7">crash-doc-7.0.2-2.23.7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="crash-eppic-7.0.2-2.23.7">
      <FullProductName ProductID="crash-eppic-7.0.2-2.23.7">crash-eppic-7.0.2-2.23.7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="crash-gcore-7.0.2-2.23.7">
      <FullProductName ProductID="crash-gcore-7.0.2-2.23.7">crash-gcore-7.0.2-2.23.7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="crash-kmp-default-7.0.2_k3.11.10_34-2.23.7">
      <FullProductName ProductID="crash-kmp-default-7.0.2_k3.11.10_34-2.23.7">crash-kmp-default-7.0.2_k3.11.10_34-2.23.7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="crash-kmp-desktop-7.0.2_k3.11.10_34-2.23.7">
      <FullProductName ProductID="crash-kmp-desktop-7.0.2_k3.11.10_34-2.23.7">crash-kmp-desktop-7.0.2_k3.11.10_34-2.23.7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="crash-kmp-pae-7.0.2_k3.11.10_34-2.23.7">
      <FullProductName ProductID="crash-kmp-pae-7.0.2_k3.11.10_34-2.23.7">crash-kmp-pae-7.0.2_k3.11.10_34-2.23.7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="crash-kmp-xen-7.0.2_k3.11.10_34-2.23.7">
      <FullProductName ProductID="crash-kmp-xen-7.0.2_k3.11.10_34-2.23.7">crash-kmp-xen-7.0.2_k3.11.10_34-2.23.7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="hdjmod-1.28-16.23.2">
      <FullProductName ProductID="hdjmod-1.28-16.23.2">hdjmod-1.28-16.23.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="hdjmod-kmp-default-1.28_k3.11.10_34-16.23.2">
      <FullProductName ProductID="hdjmod-kmp-default-1.28_k3.11.10_34-16.23.2">hdjmod-kmp-default-1.28_k3.11.10_34-16.23.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="hdjmod-kmp-desktop-1.28_k3.11.10_34-16.23.2">
      <FullProductName ProductID="hdjmod-kmp-desktop-1.28_k3.11.10_34-16.23.2">hdjmod-kmp-desktop-1.28_k3.11.10_34-16.23.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="hdjmod-kmp-pae-1.28_k3.11.10_34-16.23.2">
      <FullProductName ProductID="hdjmod-kmp-pae-1.28_k3.11.10_34-16.23.2">hdjmod-kmp-pae-1.28_k3.11.10_34-16.23.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="hdjmod-kmp-xen-1.28_k3.11.10_34-16.23.2">
      <FullProductName ProductID="hdjmod-kmp-xen-1.28_k3.11.10_34-16.23.2">hdjmod-kmp-xen-1.28_k3.11.10_34-16.23.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ipset-6.21.1-2.27.2">
      <FullProductName ProductID="ipset-6.21.1-2.27.2">ipset-6.21.1-2.27.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ipset-devel-6.21.1-2.27.2">
      <FullProductName ProductID="ipset-devel-6.21.1-2.27.2">ipset-devel-6.21.1-2.27.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ipset-kmp-default-6.21.1_k3.11.10_34-2.27.2">
      <FullProductName ProductID="ipset-kmp-default-6.21.1_k3.11.10_34-2.27.2">ipset-kmp-default-6.21.1_k3.11.10_34-2.27.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ipset-kmp-desktop-6.21.1_k3.11.10_34-2.27.2">
      <FullProductName ProductID="ipset-kmp-desktop-6.21.1_k3.11.10_34-2.27.2">ipset-kmp-desktop-6.21.1_k3.11.10_34-2.27.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ipset-kmp-pae-6.21.1_k3.11.10_34-2.27.2">
      <FullProductName ProductID="ipset-kmp-pae-6.21.1_k3.11.10_34-2.27.2">ipset-kmp-pae-6.21.1_k3.11.10_34-2.27.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ipset-kmp-xen-6.21.1_k3.11.10_34-2.27.2">
      <FullProductName ProductID="ipset-kmp-xen-6.21.1_k3.11.10_34-2.27.2">ipset-kmp-xen-6.21.1_k3.11.10_34-2.27.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="iscsitarget-1.4.20.3-13.23.2">
      <FullProductName ProductID="iscsitarget-1.4.20.3-13.23.2">iscsitarget-1.4.20.3-13.23.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="iscsitarget-kmp-default-1.4.20.3_k3.11.10_34-13.23.2">
      <FullProductName ProductID="iscsitarget-kmp-default-1.4.20.3_k3.11.10_34-13.23.2">iscsitarget-kmp-default-1.4.20.3_k3.11.10_34-13.23.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="iscsitarget-kmp-desktop-1.4.20.3_k3.11.10_34-13.23.2">
      <FullProductName ProductID="iscsitarget-kmp-desktop-1.4.20.3_k3.11.10_34-13.23.2">iscsitarget-kmp-desktop-1.4.20.3_k3.11.10_34-13.23.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="iscsitarget-kmp-pae-1.4.20.3_k3.11.10_34-13.23.2">
      <FullProductName ProductID="iscsitarget-kmp-pae-1.4.20.3_k3.11.10_34-13.23.2">iscsitarget-kmp-pae-1.4.20.3_k3.11.10_34-13.23.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="iscsitarget-kmp-xen-1.4.20.3_k3.11.10_34-13.23.2">
      <FullProductName ProductID="iscsitarget-kmp-xen-1.4.20.3_k3.11.10_34-13.23.2">iscsitarget-kmp-xen-1.4.20.3_k3.11.10_34-13.23.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-3.11.10-34.2">
      <FullProductName ProductID="kernel-debug-3.11.10-34.2">kernel-debug-3.11.10-34.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-base-3.11.10-34.2">
      <FullProductName ProductID="kernel-debug-base-3.11.10-34.2">kernel-debug-base-3.11.10-34.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-devel-3.11.10-34.2">
      <FullProductName ProductID="kernel-debug-devel-3.11.10-34.2">kernel-debug-devel-3.11.10-34.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-3.11.10-34.2">
      <FullProductName ProductID="kernel-default-3.11.10-34.2">kernel-default-3.11.10-34.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-3.11.10-34.2">
      <FullProductName ProductID="kernel-default-base-3.11.10-34.2">kernel-default-base-3.11.10-34.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-3.11.10-34.2">
      <FullProductName ProductID="kernel-default-devel-3.11.10-34.2">kernel-default-devel-3.11.10-34.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-desktop-3.11.10-34.2">
      <FullProductName ProductID="kernel-desktop-3.11.10-34.2">kernel-desktop-3.11.10-34.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-desktop-base-3.11.10-34.2">
      <FullProductName ProductID="kernel-desktop-base-3.11.10-34.2">kernel-desktop-base-3.11.10-34.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-desktop-devel-3.11.10-34.2">
      <FullProductName ProductID="kernel-desktop-devel-3.11.10-34.2">kernel-desktop-devel-3.11.10-34.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-3.11.10-34.1">
      <FullProductName ProductID="kernel-devel-3.11.10-34.1">kernel-devel-3.11.10-34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-3.11.10-34.2">
      <FullProductName ProductID="kernel-docs-3.11.10-34.2">kernel-docs-3.11.10-34.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-3.11.10-34.1">
      <FullProductName ProductID="kernel-ec2-3.11.10-34.1">kernel-ec2-3.11.10-34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-base-3.11.10-34.1">
      <FullProductName ProductID="kernel-ec2-base-3.11.10-34.1">kernel-ec2-base-3.11.10-34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-devel-3.11.10-34.1">
      <FullProductName ProductID="kernel-ec2-devel-3.11.10-34.1">kernel-ec2-devel-3.11.10-34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-3.11.10-34.2">
      <FullProductName ProductID="kernel-pae-3.11.10-34.2">kernel-pae-3.11.10-34.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-base-3.11.10-34.2">
      <FullProductName ProductID="kernel-pae-base-3.11.10-34.2">kernel-pae-base-3.11.10-34.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-devel-3.11.10-34.2">
      <FullProductName ProductID="kernel-pae-devel-3.11.10-34.2">kernel-pae-devel-3.11.10-34.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-3.11.10-34.1">
      <FullProductName ProductID="kernel-source-3.11.10-34.1">kernel-source-3.11.10-34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-vanilla-3.11.10-34.1">
      <FullProductName ProductID="kernel-source-vanilla-3.11.10-34.1">kernel-source-vanilla-3.11.10-34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-3.11.10-34.1">
      <FullProductName ProductID="kernel-syms-3.11.10-34.1">kernel-syms-3.11.10-34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-3.11.10-34.2">
      <FullProductName ProductID="kernel-trace-3.11.10-34.2">kernel-trace-3.11.10-34.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-base-3.11.10-34.2">
      <FullProductName ProductID="kernel-trace-base-3.11.10-34.2">kernel-trace-base-3.11.10-34.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-devel-3.11.10-34.2">
      <FullProductName ProductID="kernel-trace-devel-3.11.10-34.2">kernel-trace-devel-3.11.10-34.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-3.11.10-34.2">
      <FullProductName ProductID="kernel-vanilla-3.11.10-34.2">kernel-vanilla-3.11.10-34.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-devel-3.11.10-34.2">
      <FullProductName ProductID="kernel-vanilla-devel-3.11.10-34.2">kernel-vanilla-devel-3.11.10-34.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-3.11.10-34.2">
      <FullProductName ProductID="kernel-xen-3.11.10-34.2">kernel-xen-3.11.10-34.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-base-3.11.10-34.2">
      <FullProductName ProductID="kernel-xen-base-3.11.10-34.2">kernel-xen-base-3.11.10-34.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-devel-3.11.10-34.2">
      <FullProductName ProductID="kernel-xen-devel-3.11.10-34.2">kernel-xen-devel-3.11.10-34.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libipset3-6.21.1-2.27.2">
      <FullProductName ProductID="libipset3-6.21.1-2.27.2">libipset3-6.21.1-2.27.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ndiswrapper-1.58-23.1">
      <FullProductName ProductID="ndiswrapper-1.58-23.1">ndiswrapper-1.58-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ndiswrapper-kmp-default-1.58_k3.11.10_34-23.1">
      <FullProductName ProductID="ndiswrapper-kmp-default-1.58_k3.11.10_34-23.1">ndiswrapper-kmp-default-1.58_k3.11.10_34-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ndiswrapper-kmp-desktop-1.58_k3.11.10_34-23.1">
      <FullProductName ProductID="ndiswrapper-kmp-desktop-1.58_k3.11.10_34-23.1">ndiswrapper-kmp-desktop-1.58_k3.11.10_34-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ndiswrapper-kmp-pae-1.58_k3.11.10_34-23.1">
      <FullProductName ProductID="ndiswrapper-kmp-pae-1.58_k3.11.10_34-23.1">ndiswrapper-kmp-pae-1.58_k3.11.10_34-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pcfclock-0.44-258.23.1">
      <FullProductName ProductID="pcfclock-0.44-258.23.1">pcfclock-0.44-258.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pcfclock-kmp-default-0.44_k3.11.10_34-258.23.1">
      <FullProductName ProductID="pcfclock-kmp-default-0.44_k3.11.10_34-258.23.1">pcfclock-kmp-default-0.44_k3.11.10_34-258.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pcfclock-kmp-desktop-0.44_k3.11.10_34-258.23.1">
      <FullProductName ProductID="pcfclock-kmp-desktop-0.44_k3.11.10_34-258.23.1">pcfclock-kmp-desktop-0.44_k3.11.10_34-258.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pcfclock-kmp-pae-0.44_k3.11.10_34-258.23.1">
      <FullProductName ProductID="pcfclock-kmp-pae-0.44_k3.11.10_34-258.23.1">pcfclock-kmp-pae-0.44_k3.11.10_34-258.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python-virtualbox-4.2.36-2.56.1">
      <FullProductName ProductID="python-virtualbox-4.2.36-2.56.1">python-virtualbox-4.2.36-2.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vhba-kmp-20130607-2.24.1">
      <FullProductName ProductID="vhba-kmp-20130607-2.24.1">vhba-kmp-20130607-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vhba-kmp-default-20130607_k3.11.10_34-2.24.1">
      <FullProductName ProductID="vhba-kmp-default-20130607_k3.11.10_34-2.24.1">vhba-kmp-default-20130607_k3.11.10_34-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vhba-kmp-desktop-20130607_k3.11.10_34-2.24.1">
      <FullProductName ProductID="vhba-kmp-desktop-20130607_k3.11.10_34-2.24.1">vhba-kmp-desktop-20130607_k3.11.10_34-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vhba-kmp-pae-20130607_k3.11.10_34-2.24.1">
      <FullProductName ProductID="vhba-kmp-pae-20130607_k3.11.10_34-2.24.1">vhba-kmp-pae-20130607_k3.11.10_34-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vhba-kmp-xen-20130607_k3.11.10_34-2.24.1">
      <FullProductName ProductID="vhba-kmp-xen-20130607_k3.11.10_34-2.24.1">vhba-kmp-xen-20130607_k3.11.10_34-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-4.2.36-2.56.1">
      <FullProductName ProductID="virtualbox-4.2.36-2.56.1">virtualbox-4.2.36-2.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-devel-4.2.36-2.56.1">
      <FullProductName ProductID="virtualbox-devel-4.2.36-2.56.1">virtualbox-devel-4.2.36-2.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-guest-kmp-default-4.2.36_k3.11.10_34-2.56.1">
      <FullProductName ProductID="virtualbox-guest-kmp-default-4.2.36_k3.11.10_34-2.56.1">virtualbox-guest-kmp-default-4.2.36_k3.11.10_34-2.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-guest-kmp-desktop-4.2.36_k3.11.10_34-2.56.1">
      <FullProductName ProductID="virtualbox-guest-kmp-desktop-4.2.36_k3.11.10_34-2.56.1">virtualbox-guest-kmp-desktop-4.2.36_k3.11.10_34-2.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-guest-kmp-pae-4.2.36_k3.11.10_34-2.56.1">
      <FullProductName ProductID="virtualbox-guest-kmp-pae-4.2.36_k3.11.10_34-2.56.1">virtualbox-guest-kmp-pae-4.2.36_k3.11.10_34-2.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-guest-tools-4.2.36-2.56.1">
      <FullProductName ProductID="virtualbox-guest-tools-4.2.36-2.56.1">virtualbox-guest-tools-4.2.36-2.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-guest-x11-4.2.36-2.56.1">
      <FullProductName ProductID="virtualbox-guest-x11-4.2.36-2.56.1">virtualbox-guest-x11-4.2.36-2.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-host-kmp-default-4.2.36_k3.11.10_34-2.56.1">
      <FullProductName ProductID="virtualbox-host-kmp-default-4.2.36_k3.11.10_34-2.56.1">virtualbox-host-kmp-default-4.2.36_k3.11.10_34-2.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-host-kmp-desktop-4.2.36_k3.11.10_34-2.56.1">
      <FullProductName ProductID="virtualbox-host-kmp-desktop-4.2.36_k3.11.10_34-2.56.1">virtualbox-host-kmp-desktop-4.2.36_k3.11.10_34-2.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-host-kmp-pae-4.2.36_k3.11.10_34-2.56.1">
      <FullProductName ProductID="virtualbox-host-kmp-pae-4.2.36_k3.11.10_34-2.56.1">virtualbox-host-kmp-pae-4.2.36_k3.11.10_34-2.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-host-source-4.2.36-2.56.1">
      <FullProductName ProductID="virtualbox-host-source-4.2.36-2.56.1">virtualbox-host-source-4.2.36-2.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-qt-4.2.36-2.56.1">
      <FullProductName ProductID="virtualbox-qt-4.2.36-2.56.1">virtualbox-qt-4.2.36-2.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-websrv-4.2.36-2.56.1">
      <FullProductName ProductID="virtualbox-websrv-4.2.36-2.56.1">virtualbox-websrv-4.2.36-2.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-4.3.4_10-57.1">
      <FullProductName ProductID="xen-4.3.4_10-57.1">xen-4.3.4_10-57.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-devel-4.3.4_10-57.1">
      <FullProductName ProductID="xen-devel-4.3.4_10-57.1">xen-devel-4.3.4_10-57.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-doc-html-4.3.4_10-57.1">
      <FullProductName ProductID="xen-doc-html-4.3.4_10-57.1">xen-doc-html-4.3.4_10-57.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-default-4.3.4_10_k3.11.10_34-57.1">
      <FullProductName ProductID="xen-kmp-default-4.3.4_10_k3.11.10_34-57.1">xen-kmp-default-4.3.4_10_k3.11.10_34-57.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-desktop-4.3.4_10_k3.11.10_34-57.1">
      <FullProductName ProductID="xen-kmp-desktop-4.3.4_10_k3.11.10_34-57.1">xen-kmp-desktop-4.3.4_10_k3.11.10_34-57.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-pae-4.3.4_10_k3.11.10_34-57.1">
      <FullProductName ProductID="xen-kmp-pae-4.3.4_10_k3.11.10_34-57.1">xen-kmp-pae-4.3.4_10_k3.11.10_34-57.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-4.3.4_10-57.1">
      <FullProductName ProductID="xen-libs-4.3.4_10-57.1">xen-libs-4.3.4_10-57.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-32bit-4.3.4_10-57.1">
      <FullProductName ProductID="xen-libs-32bit-4.3.4_10-57.1">xen-libs-32bit-4.3.4_10-57.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-4.3.4_10-57.1">
      <FullProductName ProductID="xen-tools-4.3.4_10-57.1">xen-tools-4.3.4_10-57.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-domU-4.3.4_10-57.1">
      <FullProductName ProductID="xen-tools-domU-4.3.4_10-57.1">xen-tools-domU-4.3.4_10-57.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-xend-tools-4.3.4_10-57.1">
      <FullProductName ProductID="xen-xend-tools-4.3.4_10-57.1">xen-xend-tools-4.3.4_10-57.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xtables-addons-2.3-2.23.1">
      <FullProductName ProductID="xtables-addons-2.3-2.23.1">xtables-addons-2.3-2.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xtables-addons-kmp-default-2.3_k3.11.10_34-2.23.1">
      <FullProductName ProductID="xtables-addons-kmp-default-2.3_k3.11.10_34-2.23.1">xtables-addons-kmp-default-2.3_k3.11.10_34-2.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xtables-addons-kmp-desktop-2.3_k3.11.10_34-2.23.1">
      <FullProductName ProductID="xtables-addons-kmp-desktop-2.3_k3.11.10_34-2.23.1">xtables-addons-kmp-desktop-2.3_k3.11.10_34-2.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xtables-addons-kmp-pae-2.3_k3.11.10_34-2.23.1">
      <FullProductName ProductID="xtables-addons-kmp-pae-2.3_k3.11.10_34-2.23.1">xtables-addons-kmp-pae-2.3_k3.11.10_34-2.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xtables-addons-kmp-xen-2.3_k3.11.10_34-2.23.1">
      <FullProductName ProductID="xtables-addons-kmp-xen-2.3_k3.11.10_34-2.23.1">xtables-addons-kmp-xen-2.3_k3.11.10_34-2.23.1</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the nfqnl_zcopy function in net/netfilter/nfnetlink_queue_core.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation. NOTE: the affected code was moved to the skb_zerocopy function in net/core/skbuff.c before the vulnerability was announced.</Note>
    </Notes>
    <CVE>CVE-2014-2568</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.8</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-2568.html</URL>
        <Description>CVE-2014-2568</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/869564</URL>
        <Description>SUSE Bug 869564</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.</Note>
    </Notes>
    <CVE>CVE-2014-8133</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8133.html</URL>
        <Description>CVE-2014-8133</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/817142</URL>
        <Description>SUSE Bug 817142</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/906545</URL>
        <Description>SUSE Bug 906545</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/907818</URL>
        <Description>SUSE Bug 907818</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/909077</URL>
        <Description>SUSE Bug 909077</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923485</URL>
        <Description>SUSE Bug 923485</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Linux kernel through 3.17.4 does not properly restrict dropping of supplemental group memberships in certain namespace scenarios, which allows local users to bypass intended file permissions by leveraging a POSIX ACL containing an entry for the group category that is more restrictive than the entry for the other category, aka a "negative groups" issue, related to kernel/groups.c, kernel/uid16.c, and kernel/user_namespace.c.</Note>
    </Notes>
    <CVE>CVE-2014-8989</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8989.html</URL>
        <Description>CVE-2014-8989</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/906545</URL>
        <Description>SUSE Bug 906545</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The do_double_fault function in arch/x86/kernel/traps.c in the Linux kernel through 3.17.4 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to cause a denial of service (panic) via a modify_ldt system call, as demonstrated by sigreturn_32 in the linux-clock-tests test suite.</Note>
    </Notes>
    <CVE>CVE-2014-9090</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9090.html</URL>
        <Description>CVE-2014-9090</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/817142</URL>
        <Description>SUSE Bug 817142</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/907818</URL>
        <Description>SUSE Bug 907818</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/909077</URL>
        <Description>SUSE Bug 909077</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/910251</URL>
        <Description>SUSE Bug 910251</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel through 3.18.1 does not ensure that Thread Local Storage (TLS) descriptors are loaded before proceeding with other steps, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application that reads a TLS base address.</Note>
    </Notes>
    <CVE>CVE-2014-9419</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9419.html</URL>
        <Description>CVE-2014-9419</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/911326</URL>
        <Description>SUSE Bug 911326</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 3.18.2 allows local users to cause a denial of service (memory corruption or panic) or possibly have unspecified other impact via keyctl commands that trigger access to a key structure member during garbage collection of a key.</Note>
    </Notes>
    <CVE>CVE-2014-9529</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9529.html</URL>
        <Description>CVE-2014-9529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912202</URL>
        <Description>SUSE Bug 912202</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.</Note>
    </Notes>
    <CVE>CVE-2014-9683</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9683.html</URL>
        <Description>CVE-2014-9683</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/918333</URL>
        <Description>SUSE Bug 918333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that triggers extension loading, as demonstrated by configuring a PPTP tunnel in a NAT environment.</Note>
    </Notes>
    <CVE>CVE-2014-9715</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9715.html</URL>
        <Description>CVE-2014-9715</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927780</URL>
        <Description>SUSE Bug 927780</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The UDF filesystem implementation in the Linux kernel before 3.18.2 does not validate certain lengths, which allows local users to cause a denial of service (buffer over-read and system crash) via a crafted filesystem image, related to fs/udf/inode.c and fs/udf/symlink.c.</Note>
    </Notes>
    <CVE>CVE-2014-9728</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9728.html</URL>
        <Description>CVE-2014-9728</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/911325</URL>
        <Description>SUSE Bug 911325</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/933904</URL>
        <Description>SUSE Bug 933904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.18.2 does not ensure a certain data-structure size consistency, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.</Note>
    </Notes>
    <CVE>CVE-2014-9729</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9729.html</URL>
        <Description>CVE-2014-9729</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/911325</URL>
        <Description>SUSE Bug 911325</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/933904</URL>
        <Description>SUSE Bug 933904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The udf_pc_to_char function in fs/udf/symlink.c in the Linux kernel before 3.18.2 relies on component lengths that are unused, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.</Note>
    </Notes>
    <CVE>CVE-2014-9730</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9730.html</URL>
        <Description>CVE-2014-9730</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/911325</URL>
        <Description>SUSE Bug 911325</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/933904</URL>
        <Description>SUSE Bug 933904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The UDF filesystem implementation in the Linux kernel before 3.18.2 does not ensure that space is available for storing a symlink target's name along with a trailing \0 character, which allows local users to obtain sensitive information via a crafted filesystem image, related to fs/udf/symlink.c and fs/udf/unicode.c.</Note>
    </Notes>
    <CVE>CVE-2014-9731</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9731.html</URL>
        <Description>CVE-2014-9731</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/911325</URL>
        <Description>SUSE Bug 911325</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/933896</URL>
        <Description>SUSE Bug 933896</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.</Note>
    </Notes>
    <CVE>CVE-2015-0272</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0272.html</URL>
        <Description>CVE-2015-0272</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/944296</URL>
        <Description>SUSE Bug 944296</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951638</URL>
        <Description>SUSE Bug 951638</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/955354</URL>
        <Description>SUSE Bug 955354</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0 (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions, allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2015-0777</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0777.html</URL>
        <Description>CVE-2015-0777</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917830</URL>
        <Description>SUSE Bug 917830</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execution of this function.</Note>
    </Notes>
    <CVE>CVE-2015-1420</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1420.html</URL>
        <Description>CVE-2015-1420</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915517</URL>
        <Description>SUSE Bug 915517</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that leads to improper handling of shared-key data.</Note>
    </Notes>
    <CVE>CVE-2015-1421</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1421.html</URL>
        <Description>CVE-2015-1421</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915577</URL>
        <Description>SUSE Bug 915577</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922004</URL>
        <Description>SUSE Bug 922004</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/939261</URL>
        <Description>SUSE Bug 939261</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.</Note>
    </Notes>
    <CVE>CVE-2015-2041</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2041.html</URL>
        <Description>CVE-2015-2041</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/903967</URL>
        <Description>SUSE Bug 903967</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/919007</URL>
        <Description>SUSE Bug 919007</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">net/rds/sysctl.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.</Note>
    </Notes>
    <CVE>CVE-2015-2042</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2042.html</URL>
        <Description>CVE-2015-2042</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/903967</URL>
        <Description>SUSE Bug 903967</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/919018</URL>
        <Description>SUSE Bug 919018</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.</Note>
    </Notes>
    <CVE>CVE-2015-2150</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2150.html</URL>
        <Description>CVE-2015-2150</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/800280</URL>
        <Description>SUSE Bug 800280</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/903967</URL>
        <Description>SUSE Bug 903967</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/919463</URL>
        <Description>SUSE Bug 919463</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd.</Note>
    </Notes>
    <CVE>CVE-2015-2666</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2666.html</URL>
        <Description>CVE-2015-2666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922944</URL>
        <Description>SUSE Bug 922944</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrated by an attack against seccomp before 3.16.</Note>
    </Notes>
    <CVE>CVE-2015-2830</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2830.html</URL>
        <Description>CVE-2015-2830</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/903967</URL>
        <Description>SUSE Bug 903967</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/926240</URL>
        <Description>SUSE Bug 926240</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.</Note>
    </Notes>
    <CVE>CVE-2015-2922</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2922.html</URL>
        <Description>CVE-2015-2922</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/903967</URL>
        <Description>SUSE Bug 903967</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922583</URL>
        <Description>SUSE Bug 922583</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/926223</URL>
        <Description>SUSE Bug 926223</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a "double-chroot attack."</Note>
    </Notes>
    <CVE>CVE-2015-2925</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2925.html</URL>
        <Description>CVE-2015-2925</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/926238</URL>
        <Description>SUSE Bug 926238</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951625</URL>
        <Description>SUSE Bug 951625</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951638</URL>
        <Description>SUSE Bug 951638</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963994</URL>
        <Description>SUSE Bug 963994</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in net/sctp/socket.c in the Linux kernel before 4.1.2 allows local users to cause a denial of service (list corruption and panic) via a rapid series of system calls related to sockets, as demonstrated by setsockopt calls.</Note>
    </Notes>
    <CVE>CVE-2015-3212</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3212.html</URL>
        <Description>CVE-2015-3212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936502</URL>
        <Description>SUSE Bug 936502</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel before 3.19.6 allows local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped.</Note>
    </Notes>
    <CVE>CVE-2015-3339</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3339.html</URL>
        <Description>CVE-2015-3339</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/903967</URL>
        <Description>SUSE Bug 903967</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/928130</URL>
        <Description>SUSE Bug 928130</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/939263</URL>
        <Description>SUSE Bug 939263</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 does not initialize a certain list data structure during an unhash operation, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) by leveraging the ability to make a SOCK_DGRAM socket system call for the IPPROTO_ICMP or IPPROTO_ICMPV6 protocol, and then making a connect system call after a disconnect.</Note>
    </Notes>
    <CVE>CVE-2015-3636</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3636.html</URL>
        <Description>CVE-2015-3636</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/929525</URL>
        <Description>SUSE Bug 929525</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/939277</URL>
        <Description>SUSE Bug 939277</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/994624</URL>
        <Description>SUSE Bug 994624</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer signedness error in the oz_hcd_get_desc_cnf function in drivers/staging/ozwpan/ozhcd.c in the OZWPAN driver in the Linux kernel through 4.0.5 allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-4001</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4001.html</URL>
        <Description>CVE-2015-4001</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/933934</URL>
        <Description>SUSE Bug 933934</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 does not ensure that certain length values are sufficiently large, which allows remote attackers to cause a denial of service (system crash or large loop) or possibly execute arbitrary code via a crafted packet, related to the (1) oz_usb_rx and (2) oz_usb_handle_ep_data functions.</Note>
    </Notes>
    <CVE>CVE-2015-4002</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4002.html</URL>
        <Description>CVE-2015-4002</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/933934</URL>
        <Description>SUSE Bug 933934</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The oz_usb_handle_ep_data function in drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 allows remote attackers to cause a denial of service (divide-by-zero error and system crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-4003</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4003.html</URL>
        <Description>CVE-2015-4003</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/933934</URL>
        <Description>SUSE Bug 933934</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-4004</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4004.html</URL>
        <Description>CVE-2015-4004</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/933934</URL>
        <Description>SUSE Bug 933934</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Array index error in the tcm_vhost_make_tpg function in drivers/vhost/scsi.c in the Linux kernel before 4.0 might allow guest OS users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted VHOST_SCSI_SET_ENDPOINT ioctl call.  NOTE: the affected function was renamed to vhost_scsi_make_tpg before the vulnerability was announced.</Note>
    </Notes>
    <CVE>CVE-2015-4036</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4036.html</URL>
        <Description>CVE-2015-4036</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931988</URL>
        <Description>SUSE Bug 931988</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.19.1 does not validate certain length values, which allows local users to cause a denial of service (incorrect data representation or integer overflow, and OOPS) via a crafted UDF filesystem.</Note>
    </Notes>
    <CVE>CVE-2015-4167</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4167.html</URL>
        <Description>CVE-2015-4167</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917839</URL>
        <Description>SUSE Bug 917839</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/933907</URL>
        <Description>SUSE Bug 933907</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The kvm_apic_has_events function in arch/x86/kvm/lapic.h in the Linux kernel through 4.1.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging /dev/kvm access for an ioctl call.</Note>
    </Notes>
    <CVE>CVE-2015-4692</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4692.html</URL>
        <Description>CVE-2015-4692</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935542</URL>
        <Description>SUSE Bug 935542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allows local users to cause a denial of service (system crash) by creating a packet filter and then loading crafted BPF instructions that trigger late convergence by the JIT compiler.</Note>
    </Notes>
    <CVE>CVE-2015-4700</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4700.html</URL>
        <Description>CVE-2015-4700</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935705</URL>
        <Description>SUSE Bug 935705</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/939273</URL>
        <Description>SUSE Bug 939273</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.</Note>
    </Notes>
    <CVE>CVE-2015-5157</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5157.html</URL>
        <Description>CVE-2015-5157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937969</URL>
        <Description>SUSE Bug 937969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937970</URL>
        <Description>SUSE Bug 937970</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938706</URL>
        <Description>SUSE Bug 938706</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/939207</URL>
        <Description>SUSE Bug 939207</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The sctp_init function in net/sctp/protocol.c in the Linux kernel before 4.2.3 has an incorrect sequence of protocol-initialization steps, which allows local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the steps have finished.</Note>
    </Notes>
    <CVE>CVE-2015-5283</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5283.html</URL>
        <Description>CVE-2015-5283</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/947155</URL>
        <Description>SUSE Bug 947155</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.</Note>
    </Notes>
    <CVE>CVE-2015-5307</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5307.html</URL>
        <Description>CVE-2015-5307</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/953527</URL>
        <Description>SUSE Bug 953527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954018</URL>
        <Description>SUSE Bug 954018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954404</URL>
        <Description>SUSE Bug 954404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954405</URL>
        <Description>SUSE Bug 954405</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962977</URL>
        <Description>SUSE Bug 962977</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet flood.</Note>
    </Notes>
    <CVE>CVE-2015-5364</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5364.html</URL>
        <Description>CVE-2015-5364</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/781018</URL>
        <Description>SUSE Bug 781018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936831</URL>
        <Description>SUSE Bug 936831</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/939276</URL>
        <Description>SUSE Bug 939276</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/945112</URL>
        <Description>SUSE Bug 945112</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return values, which allows remote attackers to cause a denial of service (EPOLLET epoll application read outage) via an incorrect checksum in a UDP packet, a different vulnerability than CVE-2015-5364.</Note>
    </Notes>
    <CVE>CVE-2015-5366</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5366.html</URL>
        <Description>CVE-2015-5366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/781018</URL>
        <Description>SUSE Bug 781018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936831</URL>
        <Description>SUSE Bug 936831</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/939276</URL>
        <Description>SUSE Bug 939276</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/945112</URL>
        <Description>SUSE Bug 945112</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.</Note>
    </Notes>
    <CVE>CVE-2015-5707</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5707.html</URL>
        <Description>CVE-2015-5707</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923755</URL>
        <Description>SUSE Bug 923755</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940338</URL>
        <Description>SUSE Bug 940338</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940342</URL>
        <Description>SUSE Bug 940342</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963994</URL>
        <Description>SUSE Bug 963994</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.</Note>
    </Notes>
    <CVE>CVE-2015-6937</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6937.html</URL>
        <Description>CVE-2015-6937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923755</URL>
        <Description>SUSE Bug 923755</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/945825</URL>
        <Description>SUSE Bug 945825</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952384</URL>
        <Description>SUSE Bug 952384</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/953052</URL>
        <Description>SUSE Bug 953052</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963994</URL>
        <Description>SUSE Bug 963994</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel before 4.3.4 does not properly use a semaphore, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls.</Note>
    </Notes>
    <CVE>CVE-2015-7550</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7550.html</URL>
        <Description>CVE-2015-7550</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052256</URL>
        <Description>SUSE Bug 1052256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958951</URL>
        <Description>SUSE Bug 958951</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.</Note>
    </Notes>
    <CVE>CVE-2015-7799</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7799.html</URL>
        <Description>CVE-2015-7799</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052256</URL>
        <Description>SUSE Bug 1052256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/949936</URL>
        <Description>SUSE Bug 949936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951638</URL>
        <Description>SUSE Bug 951638</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor.</Note>
    </Notes>
    <CVE>CVE-2015-7833</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7833.html</URL>
        <Description>CVE-2015-7833</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/950998</URL>
        <Description>SUSE Bug 950998</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990058</URL>
        <Description>SUSE Bug 990058</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.</Note>
    </Notes>
    <CVE>CVE-2015-7872</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7872.html</URL>
        <Description>CVE-2015-7872</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951440</URL>
        <Description>SUSE Bug 951440</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951542</URL>
        <Description>SUSE Bug 951542</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951638</URL>
        <Description>SUSE Bug 951638</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958463</URL>
        <Description>SUSE Bug 958463</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.</Note>
    </Notes>
    <CVE>CVE-2015-7885</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7885.html</URL>
        <Description>CVE-2015-7885</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126909</URL>
        <Description>SUSE Bug 1126909</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951626</URL>
        <Description>SUSE Bug 951626</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951627</URL>
        <Description>SUSE Bug 951627</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.</Note>
    </Notes>
    <CVE>CVE-2015-7990</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7990.html</URL>
        <Description>CVE-2015-7990</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/945825</URL>
        <Description>SUSE Bug 945825</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952384</URL>
        <Description>SUSE Bug 952384</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/953052</URL>
        <Description>SUSE Bug 953052</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.</Note>
    </Notes>
    <CVE>CVE-2015-8104</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8104.html</URL>
        <Description>CVE-2015-8104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/953527</URL>
        <Description>SUSE Bug 953527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954018</URL>
        <Description>SUSE Bug 954018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954404</URL>
        <Description>SUSE Bug 954404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954405</URL>
        <Description>SUSE Bug 954405</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962977</URL>
        <Description>SUSE Bug 962977</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272.  NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.</Note>
    </Notes>
    <CVE>CVE-2015-8215</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8215.html</URL>
        <Description>CVE-2015-8215</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052256</URL>
        <Description>SUSE Bug 1052256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/944296</URL>
        <Description>SUSE Bug 944296</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951638</URL>
        <Description>SUSE Bug 951638</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/955354</URL>
        <Description>SUSE Bug 955354</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The networking implementation in the Linux kernel through 4.3.3, as used in Android and other products, does not validate protocol identifiers for certain protocol families, which allows local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application.</Note>
    </Notes>
    <CVE>CVE-2015-8543</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.7</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8543.html</URL>
        <Description>CVE-2015-8543</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052256</URL>
        <Description>SUSE Bug 1052256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923755</URL>
        <Description>SUSE Bug 923755</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958886</URL>
        <Description>SUSE Bug 958886</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963994</URL>
        <Description>SUSE Bug 963994</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969522</URL>
        <Description>SUSE Bug 969522</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen, when used on a system providing PV backends, allows local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability.</Note>
    </Notes>
    <CVE>CVE-2015-8550</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8550.html</URL>
        <Description>CVE-2015-8550</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052256</URL>
        <Description>SUSE Bug 1052256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957988</URL>
        <Description>SUSE Bug 957988</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks."</Note>
    </Notes>
    <CVE>CVE-2015-8551</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.2</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8551.html</URL>
        <Description>CVE-2015-8551</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957990</URL>
        <Description>SUSE Bug 957990</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990058</URL>
        <Description>SUSE Bug 990058</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."</Note>
    </Notes>
    <CVE>CVE-2015-8552</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8552.html</URL>
        <Description>CVE-2015-8552</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957990</URL>
        <Description>SUSE Bug 957990</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990058</URL>
        <Description>SUSE Bug 990058</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel through 4.3.3 do not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.</Note>
    </Notes>
    <CVE>CVE-2015-8569</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.7</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8569.html</URL>
        <Description>CVE-2015-8569</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923755</URL>
        <Description>SUSE Bug 923755</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959190</URL>
        <Description>SUSE Bug 959190</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959399</URL>
        <Description>SUSE Bug 959399</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963994</URL>
        <Description>SUSE Bug 963994</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel before 4.3.4 does not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.</Note>
    </Notes>
    <CVE>CVE-2015-8575</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8575.html</URL>
        <Description>CVE-2015-8575</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959190</URL>
        <Description>SUSE Bug 959190</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959399</URL>
        <Description>SUSE Bug 959399</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">net/sctp/sm_sideeffect.c in the Linux kernel before 4.3 does not properly manage the relationship between a lock and a socket, which allows local users to cause a denial of service (deadlock) via a crafted sctp_accept call.</Note>
    </Notes>
    <CVE>CVE-2015-8767</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8767.html</URL>
        <Description>CVE-2015-8767</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961509</URL>
        <Description>SUSE Bug 961509</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.</Note>
    </Notes>
    <CVE>CVE-2016-0728</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0728.html</URL>
        <Description>CVE-2016-0728</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923755</URL>
        <Description>SUSE Bug 923755</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962075</URL>
        <Description>SUSE Bug 962075</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962078</URL>
        <Description>SUSE Bug 962078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963994</URL>
        <Description>SUSE Bug 963994</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
