<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2016:2912-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-11-25T12:49:49Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-11-25T12:49:49Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-11-25T12:49:49Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">

The SUSE Linux Enterprise 12 kernel was updated to 3.12.67 to receive various security and bugfixes.

The following security bugs were fixed:
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in
  the Linux kernel used an incorrect buffer size for certain timeout data,
  which allowed local users to cause a denial of service (stack memory
  corruption and panic) by reading the /proc/keys file (bsc#1004517).
- CVE-2016-7097: The filesystem implementation in the Linux kernel
  preserved the setgid bit during a setxattr call, which allowed local
  users to gain group privileges by leveraging the existence of a setgid
  program with restrictions on execute permissions (bsc#995968).
- CVE-2015-8956: The rfcomm_sock_bind function in
  net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to
  obtain sensitive information or cause a denial of service (NULL pointer
  dereference) via vectors involving a bind system call on a Bluetooth
  RFCOMM socket (bnc#1003925).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly
  determine the rate of challenge ACK segments, which made it easier for
  man-in-the-middle attackers to hijack TCP sessions via a blind in-window
  attack (bnc#989152).
- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in
  drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to
  obtain sensitive information from kernel memory by changing a certain
  length value, aka a 'double fetch' vulnerability (bnc#987542).
- CVE-2016-6327: drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux
  kernel allowed local users to cause a denial of service (NULL pointer
  dereference and system crash) by using an ABORT_TASK command to abort
  a device write operation (bnc#994748).
- CVE-2016-6480: Race condition in the ioctl_send_fib function in
  drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users
  to cause a denial of service (out-of-bounds access or system crash)
  by changing a certain size value, aka a 'double fetch' vulnerability
  (bnc#991608).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h
  in the Linux kernel did not properly maintain certain SACK state after a
  failed data copy, which allowed local users to cause a denial of service
  (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted
  SACK option (bnc#994296).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in
  drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict
  a certain length field, which allowed local users to gain privileges
  or cause a denial of service (heap-based buffer overflow) via an
  ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-8658: Stack-based buffer overflow
  in the brcmf_cfg80211_start_ap function in
  drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux
  kernel allowed local users to cause a denial of service (system crash)
  or possibly have unspecified other impact via a long SSID Information
  Element in a command to a Netlink socket (bnc#1004462).
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers
  to cause a denial of service (stack consumption and panic) or possibly
  have unspecified other impact by triggering use of the GRO path for
  packets with tunnel stacking, as demonstrated by interleaved IPv4 headers
  and GRE headers, a related issue to CVE-2016-7039 (bsc#1001486).

The following non-security bugs were fixed:

- aacraid: Fix RRQ overload (bsc#1003079).
- acpi / PM: Ignore wakeup setting if the ACPI companion can't wake up (FATE#315621).
- AF_VSOCK: Shrink the area influenced by prepare_to_wait (bsc#994520).
- apparmor: add missing id bounds check on dfa verification (bsc#1000304).
- apparmor: check that xindex is in trans_table bounds (bsc#1000304).
- apparmor: do not expose kernel stack (bsc#1000304).
- apparmor: don't check for vmalloc_addr if kvzalloc() failed (bsc#1000304).
- apparmor: ensure the target profile name is always audited (bsc#1000304).
- apparmor: exec should not be returning ENOENT when it denies (bsc#1000304).
- apparmor: fix arg_size computation for when setprocattr is null terminated (bsc#1000304).
- apparmor: fix audit full profile hname on successful load (bsc#1000304).
- apparmor: fix change_hat not finding hat after policy replacement (bsc#1000287).
- apparmor: fix disconnected bind mnts reconnection (bsc#1000304).
- apparmor: fix log failures for all profiles in a set (bsc#1000304).
- apparmor: fix module parameters can be changed after policy is locked (bsc#1000304).
- apparmor: fix oops in profile_unpack() when policy_db is not present (bsc#1000304).
- apparmor: fix oops, validate buffer size in apparmor_setprocattr() (bsc#1000304).
- apparmor: fix put() parent ref after updating the active ref (bsc#1000304).
- apparmor: fix refcount bug in profile replacement (bsc#1000304).
- apparmor: fix refcount race when finding a child profile (bsc#1000304).
- apparmor: fix replacement bug that adds new child to old parent (bsc#1000304).
- apparmor: fix uninitialized lsm_audit member (bsc#1000304).
- apparmor: fix update the mtime of the profile file on replacement (bsc#1000304).
- apparmor: internal paths should be treated as disconnected (bsc#1000304).
- apparmor: use list_next_entry instead of list_entry_next (bsc#1000304).
- arm64: Ensure pmd_present() returns false after pmd_mknotpresent() (Automatic NUMA Balancing (fate#315482)).
- arm64: mm: remove broken &amp;= operator from pmd_mknotpresent (Automatic NUMA Balancing (fate#315482)).
- avoid dentry crash triggered by NFS (bsc#984194).
- be2net: Don't leak iomapped memory on removal (bsc#921784).
- be2net: fix BE3-R FW download compatibility check (bsc#921784).
- be2net: fix wrong return value in be_check_ufi_compatibility() (bsc#921784).
- be2net: remove vlan promisc capability from VF's profile descriptors (bsc#921784).
- blkfront: fix an error path memory leak (luckily none so far).
- blk-mq: fix undefined behaviour in order_to_size() (fate#315209).
- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).
- blktap2: eliminate race from deferred work queue handling (bsc#911687).
- bond: Check length of IFLA_BOND_ARP_IP_TARGET attributes (fate#316924).
- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).
- bonding: fix curr_active_slave/carrier with loadbalance arp monitoring (fate#316924).
- bonding: Prevent IPv6 link local address on enslaved devices (fate#316924).
- bonding: prevent out of bound accesses (fate#316924).
- bonding: set carrier off for devices created through netlink (bsc#999577).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).
- btrfs: add missing discards when unpinning extents with -o discard (bsc#904489).
- btrfs: btrfs_issue_discard ensure offset/length are aligned to sector boundaries (bsc#904489).
- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#904489).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).
- btrfs: explictly delete unused block groups in close_ctree and ro-remount (bsc#904489).
- btrfs: Fix a data space underflow warning (bsc#985562, bsc#975596, bsc#984779)
- btrfs: fix fitrim discarding device area reserved for boot loader's use (bsc#904489).
- btrfs: handle quota reserve failure properly (bsc#1005666).
- btrfs: iterate over unused chunk space in FITRIM (bsc#904489).
- btrfs: make btrfs_issue_discard return bytes discarded (bsc#904489).
- btrfs: properly track when rescan worker is running (bsc#989953).
- btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock (bsc#904489).
- btrfs: reorder patches to place local patches back at the end of the series
- btrfs: skip superblocks during discard (bsc#904489).
- btrfs: test_check_exists: Fix infinite loop when searching for free space entries (bsc#987192).
- btrfs: waiting on qgroup rescan should not always be interruptible (bsc#992712).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- ceph: After a write, we must free the 'request', not the 'response'. This error crept in during the backport. bsc#995153
- cephfs: ignore error from invalidate_inode_pages2_range() in direct write (bsc#995153).
- cephfs: remove warning when ceph_releasepage() is called on dirty page (bsc#995153).
- clockevents: export clockevents_unbind_device instead of clockevents_unbind (bnc#937888).
- conntrack: RFC5961 challenge ACK confuse conntrack LAST-ACK transition (bsc#966864).
- cpumask, nodemask: implement cpumask/nodemask_pr_args() (bnc1003866).
- cxgbi: fix uninitialized flowi6 (bsc#924384 FATE#318570 bsc#921338).
- dm: fix AB-BA deadlock in __dm_destroy(). (bsc#970943)
- Document the process to blacklist upstream commit-ids
- drivers/hv: share Hyper-V SynIC constants with userspace (bnc#937888).
- drivers: hv: vmbus: avoid scheduling in interrupt context in vmbus_initiate_unload() (bnc#937888).
- drivers: hv: vmbus: avoid unneeded compiler optimizations in vmbus_wait_for_unload() (bnc#937888).
- drivers: hv: vmbus: avoid wait_for_completion() on crash (bnc#937888).
- drivers: hv: vmbus: Cleanup vmbus_set_event() (bnc#937888).
- drivers: hv: vmbus: do not loose HVMSG_TIMER_EXPIRED messages (bnc#937888).
- drivers: hv: vmbus: do not manipulate with clocksources on crash (bnc#937888).
- drivers: hv: vmbus: Force all channel messages to be delivered on CPU 0 (bnc#937888).
- drivers: hv: vmbus: Get rid of the unused irq variable (bnc#937888).
- drivers: hv: vmbus: handle various crash scenarios (bnc#937888).
- drivers: hv: vmbus: remove code duplication in message handling (bnc#937888).
- drivers: hv: vmbus: Support handling messages on multiple CPUs (bnc#937888).
- drivers: hv: vmbus: Support kexec on ws2012 r2 and above (bnc#937888).
- efi: Small leak on error in runtime map code (fate#315019).
- ext2: Enable ext2 driver in config files (bsc#976195, fate#320805)
- ext4: Add parameter for tuning handling of ext2 (bsc#976195).
- ext4: Fixup handling for custom configs.
- fs/select: add vmalloc fallback for select(2) (bsc#1000189).
- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).
- hyperv: enable call to clockevents_unbind_device in kexec/kdump path
- hyperv: replace KEXEC_CORE by plain KEXEC because we lack 2965faa5e0 in the base kernel
- i40e: fix an uninitialized variable bug (bnc#857397 FATE#315659).
- ib/iwpm: Fix a potential skb leak (bsc#924381 FATE#318568 bsc#921338).
- ib/mlx5: Fix RC transport send queue overhead computation (bnc#865545 FATE#316891).
- input: Revert 'can: dev: fix deadlock reported after bus-off'.
- input: Revert 'Input: i8042 - break load dependency between atkbd/psmouse and i8042'.
- input: Revert 'Input: i8042 - set up shared ps2_cmd_mutex for AUX ports'.
- introduce NETIF_F_GSO_ENCAP_ALL helper mask (bsc#1001486).
- iommu/amd: Update Alias-DTE in update_device_table() (bsc#975772).
- ipv6: Fix improper use or RCU (bsc#961257)
- ipv6: fix multipath route replace error recovery (bsc#930399).
- ipv6: KABI workaround for ipv6: add complete rcu protection around np-&gt;opt.
- ipv6: send NEWLINK on RA managed/otherconf changes (bsc#934067).
- ipv6: send only one NEWLINK when RA causes changes (bsc#934067).
- iscsi: Add a missed complete in iscsit_close_connection (bsc#992555, bsc#987805).
- iwlwifi: dvm: fix flush support for old firmware (bsc#940545).
- kabi: clockevents: export clockevents_unbind again.
- kabi: Fix kabi change cause by adding flock_owner to open_context (bsc#998689).
- kabi: hide harmless change in struct inet_connection_sock (fate#318553).
- kABI: protect backing-dev include in mm/migrate.
- kABI: protect enum usb_device_speed.
- kABI: protect struct mlx5_modify_qp_mbox_in.
- kabi: work around kabi changes from commit 53f9ff48f636 (bsc#988617).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kernel/fork: fix CLONE_CHILD_CLEARTID regression in nscd (bnc#941420).
- kernel/printk/printk.c: fix faulty logic in the case of recursive printk (bnc#744692, bnc#789311).
- kvm: do not handle APIC access page if in-kernel irqchip is not in use (bsc#959463).
- Kvm: vmx: defer load of APIC access page address during reset (bsc#959463).
- libceph: enable large, variable-sized OSD requests (bsc#988715).
- libceph: make r_request msg_size calculation clearer (bsc#988715).
- libceph: move r_reply_op_{len,result} into struct ceph_osd_req_op (bsc#988715).
- libceph: osdc-&gt;req_mempool should be backed by a slab pool (bsc#988715).
- libceph: rename ceph_osd_req_op::payload_len to indata_len (bsc#988715).
- libfc: do not send ABTS when resetting exchanges (bsc#962846).
- libfc: Do not take rdata-&gt;rp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).
- libfc: Fixup disc_mutex handling (bsc#962846).
- libfc: fixup locking of ptp_setup() (bsc#962846).
- libfc: Issue PRLI after a PRLO has been received (bsc#962846).
- libfc: reset exchange manager during LOGO handling (bsc#962846).
- libfc: Revisit kref handling (bnc#990245).
- libfc: sanity check cpu number extracted from xid (bsc#988440).
- libfc: send LOGO for PLOGI failure (bsc#962846).
- lib/vsprintf: implement bitmap printing through '%*pb[l]' (bnc#1003866).
- md: check command validity early in md_ioctl() (bsc#1004520).
- md: Drop sending a change uevent when stopping (bsc#1003568).
- md: lockless I/O submission for RAID1 (bsc#982783).
- md/raid5: fix a recently broken BUG_ON() (bsc#1006691).
- memcg: convert threshold to bytes (bnc#931454).
- memcg: fix thresholds for 32b architectures (bnc#931454).
- mm, cma: prevent nr_isolated_* counters from going negative (bnc#971975 VM performance -- git fixes).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- module: Issue warnings when tainting kernel (bsc#974406).
- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).
- MSI-X: fix an error path (luckily none so far).
- netback: fix flipping mode (bsc#996664).
- netback: fix refounting (bsc#978094).
- netfront: don't truncate grant references.
- netfront: use correct linear area after linearizing an skb (bsc#1007886).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1003400).
- nfs: Add a stub for GETDEVICELIST (bnc#898675).
- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).
- nfsd: Use free_conn to free connection (bsc#979451).
- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- nfs: fix BUG() crash in notify_change() with patch to chown_common() (bnc#876463).
- nfs: fix pg_test page count calculation (bnc#898675).
- nfs: nfs4_fl_prepare_ds must be careful about reporting success (bsc#1000776).
- nfsv4: add flock_owner to open context (bnc#998689).
- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).
- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).
- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).
- nfsv4: Ensure nfs_atomic_open set the dentry verifier on ENOENT (bnc#866130).
- oom: print nodemask in the oom report (bnc#1003866).
- packet: tpacket_snd(): fix signed/unsigned comparison (bsc#874131).
- perf/x86/intel: Fix bug for 'cycles:p' and 'cycles:pp' on SLM (bsc#997896).
- pm / hibernate: Fix 2G size issue of snapshot image verification (bsc#1004252).
- pm / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).
- powerpc: add kernel parameter iommu_alloc_quiet (bsc#998825).
- printk: add kernel parameter to control writes to /dev/kmsg (bsc#979928).
- qgroup: Prevent qgroup-&gt;reserved from going subzero (bsc#993841).
- qlcnic: potential NULL dereference in qlcnic_83xx_get_minidump_template() (bsc#922064 FATE#318609)
- radeon: avoid boot hang in Xen Dom0 (luckily none so far).
- ratelimit: extend to print suppressed messages on release (bsc#979928).
- ratelimit: fix bug in time interval by resetting right begin time (bsc#979928).
- rbd: truncate objects on cmpext short reads (bsc#988715).
- rpm/config.sh: Set the SP1 release string to 60.&lt;RELEASE&gt; (bsc#997059)
- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)
- rtnetlink: avoid 0 sized arrays (fate#316924).
- s390: add SMT support (bnc#994438, LTC#144756).
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).
- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).
- sd: Fix memory leak caused by RESET_WP patch (bsc#999779).
- squashfs3: properly handle dir_emit() failures (bsc#998795).
- sunrpc: Add missing support for RPC_CLNT_CREATE_NO_RETRANS_TIMEOUT (bnc#868923).
- sunrpc: Fix a regression when reconnecting (bsc#946309).
- supported.conf: Add ext2
- supported.conf: Add iscsi modules to -base (bsc#997299)
- supported.conf: Add tun to -base (bsc#992593)
- supported.conf: Add veth to -base (bsc#992591)
- target: Fix missing complete during ABORT_TASK + CMD_T_FABRIC_STOP (bsc#987621).
- target: Fix race between iscsi-target connection shutdown + ABORT_TASK (bsc#987621).
- tcp: add proper TS val into RST packets (bsc#937086).
- tcp: align tcp_xmit_size_goal() on tcp_tso_autosize() (bsc#937086).
- tcp: fix child sockets to use system default congestion control if not set (fate#318553).
- tcp: fix cwnd limited checking to improve congestion control (bsc#988617).
- tcp: refresh skb timestamp at retransmit time (bsc#937086).
- timers: Use proper base migration in add_timer_on() (bnc#993392).
- tunnels: Do not apply GRO to multiple layers of encapsulation (bsc#1001486).
- tunnels: Remove encapsulation offloads on decap (bsc#1001486).
- Update patches.drivers/mpt3sas-Fix-use-sas_is_tlr_enabled-API-before-enabli.patch (bsc#967640, bsc#992244).
- Update patches.kabi/kabi.clockevents_unbind.patch (bnc#937888).
- uprobes: Fix the memcg accounting (bnc#931454).
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).
- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- vmxnet3: Wake queue from reset work (bsc#999907).
- x86/tlb/trace: Do not trace on CPU that is offline (TLB Performance git-fixes).
- xenbus: don't invoke -&gt;is_ready() for most device states (bsc#987333).
- xenbus: inspect the correct type in xenbus_dev_request_and_reply().
- xen: Linux 3.12.63.
- xen/pciback: Fix conf_space read/write overlap check.
- xen-pciback: return proper values during BAR sizing.
- xen: Refresh patches.xen/xen3-patch-3.9 (bsc#991247).
- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153).
- xfs: fix xfs-handle-dquot-buffer-readahead-in-log-recovery-co.patch (bsc#1003153).
- xfs: handle dquot buffer readahead in log recovery correctly (bsc#955446).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
- xhci: silence warnings in switch (bnc#991665).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-DESKTOP-12-SP1-2016-1700,SUSE-SLE-Live-Patching-12-2016-1700,SUSE-SLE-Module-Public-Cloud-12-2016-1700,SUSE-SLE-SDK-12-SP1-2016-1700,SUSE-SLE-SERVER-12-SP1-2016-1700,SUSE-SLE-WE-12-SP1-2016-1700</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162912-1/</URL>
      <Description>Link for SUSE-SU-2016:2912-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00041.html</URL>
      <Description>E-Mail link for SUSE-SU-2016:2912-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1000189</URL>
      <Description>SUSE Bug 1000189</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1000287</URL>
      <Description>SUSE Bug 1000287</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1000304</URL>
      <Description>SUSE Bug 1000304</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1000776</URL>
      <Description>SUSE Bug 1000776</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1001419</URL>
      <Description>SUSE Bug 1001419</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1001486</URL>
      <Description>SUSE Bug 1001486</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1002165</URL>
      <Description>SUSE Bug 1002165</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1003079</URL>
      <Description>SUSE Bug 1003079</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1003153</URL>
      <Description>SUSE Bug 1003153</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1003400</URL>
      <Description>SUSE Bug 1003400</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1003568</URL>
      <Description>SUSE Bug 1003568</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1003866</URL>
      <Description>SUSE Bug 1003866</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1003925</URL>
      <Description>SUSE Bug 1003925</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1003964</URL>
      <Description>SUSE Bug 1003964</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1004252</URL>
      <Description>SUSE Bug 1004252</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1004462</URL>
      <Description>SUSE Bug 1004462</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1004517</URL>
      <Description>SUSE Bug 1004517</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1004520</URL>
      <Description>SUSE Bug 1004520</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1005666</URL>
      <Description>SUSE Bug 1005666</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1006691</URL>
      <Description>SUSE Bug 1006691</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1007615</URL>
      <Description>SUSE Bug 1007615</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1007886</URL>
      <Description>SUSE Bug 1007886</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/744692</URL>
      <Description>SUSE Bug 744692</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/772786</URL>
      <Description>SUSE Bug 772786</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/789311</URL>
      <Description>SUSE Bug 789311</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/857397</URL>
      <Description>SUSE Bug 857397</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/860441</URL>
      <Description>SUSE Bug 860441</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/865545</URL>
      <Description>SUSE Bug 865545</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/866130</URL>
      <Description>SUSE Bug 866130</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/868923</URL>
      <Description>SUSE Bug 868923</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/874131</URL>
      <Description>SUSE Bug 874131</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/876463</URL>
      <Description>SUSE Bug 876463</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/898675</URL>
      <Description>SUSE Bug 898675</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/904489</URL>
      <Description>SUSE Bug 904489</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/909994</URL>
      <Description>SUSE Bug 909994</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/911687</URL>
      <Description>SUSE Bug 911687</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/915183</URL>
      <Description>SUSE Bug 915183</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/921338</URL>
      <Description>SUSE Bug 921338</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/921784</URL>
      <Description>SUSE Bug 921784</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/922064</URL>
      <Description>SUSE Bug 922064</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/922634</URL>
      <Description>SUSE Bug 922634</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/924381</URL>
      <Description>SUSE Bug 924381</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/924384</URL>
      <Description>SUSE Bug 924384</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/930399</URL>
      <Description>SUSE Bug 930399</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/931454</URL>
      <Description>SUSE Bug 931454</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/934067</URL>
      <Description>SUSE Bug 934067</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/937086</URL>
      <Description>SUSE Bug 937086</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/937888</URL>
      <Description>SUSE Bug 937888</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/940545</URL>
      <Description>SUSE Bug 940545</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/941420</URL>
      <Description>SUSE Bug 941420</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/946309</URL>
      <Description>SUSE Bug 946309</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/955446</URL>
      <Description>SUSE Bug 955446</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/956514</URL>
      <Description>SUSE Bug 956514</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/959463</URL>
      <Description>SUSE Bug 959463</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/961257</URL>
      <Description>SUSE Bug 961257</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/962846</URL>
      <Description>SUSE Bug 962846</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/966864</URL>
      <Description>SUSE Bug 966864</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/967640</URL>
      <Description>SUSE Bug 967640</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/970943</URL>
      <Description>SUSE Bug 970943</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/971975</URL>
      <Description>SUSE Bug 971975</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/971989</URL>
      <Description>SUSE Bug 971989</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/974406</URL>
      <Description>SUSE Bug 974406</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/974620</URL>
      <Description>SUSE Bug 974620</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/975596</URL>
      <Description>SUSE Bug 975596</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/975772</URL>
      <Description>SUSE Bug 975772</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/976195</URL>
      <Description>SUSE Bug 976195</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/977687</URL>
      <Description>SUSE Bug 977687</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/978094</URL>
      <Description>SUSE Bug 978094</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/979451</URL>
      <Description>SUSE Bug 979451</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/979928</URL>
      <Description>SUSE Bug 979928</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/982783</URL>
      <Description>SUSE Bug 982783</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/983619</URL>
      <Description>SUSE Bug 983619</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/984194</URL>
      <Description>SUSE Bug 984194</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/984419</URL>
      <Description>SUSE Bug 984419</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/984779</URL>
      <Description>SUSE Bug 984779</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/984992</URL>
      <Description>SUSE Bug 984992</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/985562</URL>
      <Description>SUSE Bug 985562</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/986445</URL>
      <Description>SUSE Bug 986445</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/987192</URL>
      <Description>SUSE Bug 987192</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/987333</URL>
      <Description>SUSE Bug 987333</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/987542</URL>
      <Description>SUSE Bug 987542</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/987565</URL>
      <Description>SUSE Bug 987565</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/987621</URL>
      <Description>SUSE Bug 987621</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/987805</URL>
      <Description>SUSE Bug 987805</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/988440</URL>
      <Description>SUSE Bug 988440</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/988617</URL>
      <Description>SUSE Bug 988617</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/988715</URL>
      <Description>SUSE Bug 988715</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/989152</URL>
      <Description>SUSE Bug 989152</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/989953</URL>
      <Description>SUSE Bug 989953</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/990245</URL>
      <Description>SUSE Bug 990245</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/991247</URL>
      <Description>SUSE Bug 991247</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/991608</URL>
      <Description>SUSE Bug 991608</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/991665</URL>
      <Description>SUSE Bug 991665</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/992244</URL>
      <Description>SUSE Bug 992244</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/992555</URL>
      <Description>SUSE Bug 992555</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/992591</URL>
      <Description>SUSE Bug 992591</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/992593</URL>
      <Description>SUSE Bug 992593</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/992712</URL>
      <Description>SUSE Bug 992712</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/993392</URL>
      <Description>SUSE Bug 993392</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/993841</URL>
      <Description>SUSE Bug 993841</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/993890</URL>
      <Description>SUSE Bug 993890</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/993891</URL>
      <Description>SUSE Bug 993891</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/994296</URL>
      <Description>SUSE Bug 994296</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/994438</URL>
      <Description>SUSE Bug 994438</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/994520</URL>
      <Description>SUSE Bug 994520</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/994748</URL>
      <Description>SUSE Bug 994748</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/995153</URL>
      <Description>SUSE Bug 995153</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/995968</URL>
      <Description>SUSE Bug 995968</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/996664</URL>
      <Description>SUSE Bug 996664</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/997059</URL>
      <Description>SUSE Bug 997059</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/997299</URL>
      <Description>SUSE Bug 997299</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/997708</URL>
      <Description>SUSE Bug 997708</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/997896</URL>
      <Description>SUSE Bug 997896</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/998689</URL>
      <Description>SUSE Bug 998689</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/998795</URL>
      <Description>SUSE Bug 998795</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/998825</URL>
      <Description>SUSE Bug 998825</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/999577</URL>
      <Description>SUSE Bug 999577</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/999584</URL>
      <Description>SUSE Bug 999584</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/999600</URL>
      <Description>SUSE Bug 999600</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/999779</URL>
      <Description>SUSE Bug 999779</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/999907</URL>
      <Description>SUSE Bug 999907</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/999932</URL>
      <Description>SUSE Bug 999932</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8956/</URL>
      <Description>SUSE CVE CVE-2015-8956 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5696/</URL>
      <Description>SUSE CVE CVE-2016-5696 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6130/</URL>
      <Description>SUSE CVE CVE-2016-6130 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6327/</URL>
      <Description>SUSE CVE CVE-2016-6327 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6480/</URL>
      <Description>SUSE CVE CVE-2016-6480 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6828/</URL>
      <Description>SUSE CVE CVE-2016-6828 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7042/</URL>
      <Description>SUSE CVE CVE-2016-7042 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7097/</URL>
      <Description>SUSE CVE CVE-2016-7097 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7425/</URL>
      <Description>SUSE CVE CVE-2016-7425 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8658/</URL>
      <Description>SUSE CVE CVE-2016-8658 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8666/</URL>
      <Description>SUSE CVE CVE-2016-8666 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Desktop 12 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Desktop 12 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP1" CPE="cpe:/o:suse:sled:12:sp1">SUSE Linux Enterprise Desktop 12 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 12">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12" CPE="cpe:/o:suse:sle-live-patching:12">SUSE Linux Enterprise Live Patching 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Public Cloud 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Public Cloud 12">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 12" CPE="cpe:/o:suse:sle-module-public-cloud:12">SUSE Linux Enterprise Module for Public Cloud 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1" CPE="cpe:/o:suse:sles:12:sp1">SUSE Linux Enterprise Server 12 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1" CPE="cpe:/o:suse:sles_sap:12:sp1">SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 12 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 12 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP1" CPE="cpe:/o:suse:sle-sdk:12:sp1">SUSE Linux Enterprise Software Development Kit 12 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Workstation Extension 12 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Workstation Extension 12 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 12 SP1" CPE="cpe:/o:suse:sle-we:12:sp1">SUSE Linux Enterprise Workstation Extension 12 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-3.12.67-60.64.18.1">
      <FullProductName ProductID="kernel-default-3.12.67-60.64.18.1">kernel-default-3.12.67-60.64.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-3.12.67-60.64.18.1">
      <FullProductName ProductID="kernel-default-devel-3.12.67-60.64.18.1">kernel-default-devel-3.12.67-60.64.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-extra-3.12.67-60.64.18.1">
      <FullProductName ProductID="kernel-default-extra-3.12.67-60.64.18.1">kernel-default-extra-3.12.67-60.64.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-3.12.67-60.64.18.1">
      <FullProductName ProductID="kernel-devel-3.12.67-60.64.18.1">kernel-devel-3.12.67-60.64.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-macros-3.12.67-60.64.18.1">
      <FullProductName ProductID="kernel-macros-3.12.67-60.64.18.1">kernel-macros-3.12.67-60.64.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-3.12.67-60.64.18.1">
      <FullProductName ProductID="kernel-source-3.12.67-60.64.18.1">kernel-source-3.12.67-60.64.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-3.12.67-60.64.18.1">
      <FullProductName ProductID="kernel-syms-3.12.67-60.64.18.1">kernel-syms-3.12.67-60.64.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-3.12.67-60.64.18.1">
      <FullProductName ProductID="kernel-xen-3.12.67-60.64.18.1">kernel-xen-3.12.67-60.64.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-devel-3.12.67-60.64.18.1">
      <FullProductName ProductID="kernel-xen-devel-3.12.67-60.64.18.1">kernel-xen-devel-3.12.67-60.64.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-3_12_67-60_64_18-default-1-6.3">
      <FullProductName ProductID="kgraft-patch-3_12_67-60_64_18-default-1-6.3">kgraft-patch-3_12_67-60_64_18-default-1-6.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-3_12_67-60_64_18-xen-1-6.3">
      <FullProductName ProductID="kgraft-patch-3_12_67-60_64_18-xen-1-6.3">kgraft-patch-3_12_67-60_64_18-xen-1-6.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-3.12.67-60.64.18.1">
      <FullProductName ProductID="kernel-ec2-3.12.67-60.64.18.1">kernel-ec2-3.12.67-60.64.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-devel-3.12.67-60.64.18.1">
      <FullProductName ProductID="kernel-ec2-devel-3.12.67-60.64.18.1">kernel-ec2-devel-3.12.67-60.64.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-extra-3.12.67-60.64.18.1">
      <FullProductName ProductID="kernel-ec2-extra-3.12.67-60.64.18.1">kernel-ec2-extra-3.12.67-60.64.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-3.12.67-60.64.18.3">
      <FullProductName ProductID="kernel-docs-3.12.67-60.64.18.3">kernel-docs-3.12.67-60.64.18.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-build-3.12.67-60.64.18.1">
      <FullProductName ProductID="kernel-obs-build-3.12.67-60.64.18.1">kernel-obs-build-3.12.67-60.64.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-3.12.67-60.64.18.1">
      <FullProductName ProductID="kernel-default-base-3.12.67-60.64.18.1">kernel-default-base-3.12.67-60.64.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-man-3.12.67-60.64.18.1">
      <FullProductName ProductID="kernel-default-man-3.12.67-60.64.18.1">kernel-default-man-3.12.67-60.64.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-base-3.12.67-60.64.18.1">
      <FullProductName ProductID="kernel-xen-base-3.12.67-60.64.18.1">kernel-xen-base-3.12.67-60.64.18.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-default-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1">kernel-default-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Desktop 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1">kernel-default-devel-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Desktop 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-extra-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1">kernel-default-extra-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Desktop 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1">kernel-devel-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Desktop 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1">kernel-macros-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Desktop 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1">kernel-source-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Desktop 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1">kernel-syms-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Desktop 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1">kernel-xen-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Desktop 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-devel-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1">kernel-xen-devel-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Desktop 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kgraft-patch-3_12_67-60_64_18-default-1-6.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3">kgraft-patch-3_12_67-60_64_18-default-1-6.3 as a component of SUSE Linux Enterprise Live Patching 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kgraft-patch-3_12_67-60_64_18-xen-1-6.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3">kgraft-patch-3_12_67-60_64_18-xen-1-6.3 as a component of SUSE Linux Enterprise Live Patching 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Public Cloud 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1">kernel-ec2-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Module for Public Cloud 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-devel-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Public Cloud 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1">kernel-ec2-devel-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Module for Public Cloud 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-extra-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Public Cloud 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1">kernel-ec2-extra-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Module for Public Cloud 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1">kernel-default-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Server 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1">kernel-default-base-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Server 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1">kernel-default-devel-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Server 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-man-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1">kernel-default-man-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Server 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1">kernel-devel-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Server 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1">kernel-macros-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Server 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1">kernel-source-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Server 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1">kernel-syms-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Server 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1">kernel-xen-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Server 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-base-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1">kernel-xen-base-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Server 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-devel-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1">kernel-xen-devel-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Server 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1">kernel-default-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1">kernel-default-base-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1">kernel-default-devel-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-man-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1">kernel-default-man-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1">kernel-devel-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1">kernel-macros-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1">kernel-source-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1">kernel-syms-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1">kernel-xen-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-base-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1">kernel-xen-base-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-devel-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1">kernel-xen-devel-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-3.12.67-60.64.18.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3">kernel-docs-3.12.67-60.64.18.3 as a component of SUSE Linux Enterprise Software Development Kit 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-build-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1">kernel-obs-build-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-extra-3.12.67-60.64.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Workstation Extension 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1">kernel-default-extra-3.12.67-60.64.18.1 as a component of SUSE Linux Enterprise Workstation Extension 12 SP1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.</Note>
    </Notes>
    <CVE>CVE-2015-8956</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162912-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8956.html</URL>
        <Description>CVE-2015-8956</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003925</URL>
        <Description>SUSE Bug 1003925</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.</Note>
    </Notes>
    <CVE>CVE-2016-5696</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162912-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5696.html</URL>
        <Description>CVE-2016-5696</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020452</URL>
        <Description>SUSE Bug 1020452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175721</URL>
        <Description>SUSE Bug 1175721</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989152</URL>
        <Description>SUSE Bug 989152</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a "double fetch" vulnerability.</Note>
    </Notes>
    <CVE>CVE-2016-6130</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.4</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162912-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6130.html</URL>
        <Description>CVE-2016-6130</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/987542</URL>
        <Description>SUSE Bug 987542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation.</Note>
    </Notes>
    <CVE>CVE-2016-6327</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162912-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6327.html</URL>
        <Description>CVE-2016-6327</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/994748</URL>
        <Description>SUSE Bug 994748</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability.</Note>
    </Notes>
    <CVE>CVE-2016-6480</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162912-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6480.html</URL>
        <Description>CVE-2016-6480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004418</URL>
        <Description>SUSE Bug 1004418</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991608</URL>
        <Description>SUSE Bug 991608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991667</URL>
        <Description>SUSE Bug 991667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/992568</URL>
        <Description>SUSE Bug 992568</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.</Note>
    </Notes>
    <CVE>CVE-2016-6828</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162912-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6828.html</URL>
        <Description>CVE-2016-6828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052256</URL>
        <Description>SUSE Bug 1052256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/994296</URL>
        <Description>SUSE Bug 994296</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.</Note>
    </Notes>
    <CVE>CVE-2016-7042</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162912-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7042.html</URL>
        <Description>CVE-2016-7042</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004517</URL>
        <Description>SUSE Bug 1004517</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.</Note>
    </Notes>
    <CVE>CVE-2016-7097</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162912-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7097.html</URL>
        <Description>CVE-2016-7097</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021258</URL>
        <Description>SUSE Bug 1021258</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052256</URL>
        <Description>SUSE Bug 1052256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/870618</URL>
        <Description>SUSE Bug 870618</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/995968</URL>
        <Description>SUSE Bug 995968</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.</Note>
    </Notes>
    <CVE>CVE-2016-7425</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162912-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7425.html</URL>
        <Description>CVE-2016-7425</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999932</URL>
        <Description>SUSE Bug 999932</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.7.5 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket.</Note>
    </Notes>
    <CVE>CVE-2016-8658</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162912-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8658.html</URL>
        <Description>CVE-2016-8658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004462</URL>
        <Description>SUSE Bug 1004462</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.</Note>
    </Notes>
    <CVE>CVE-2016-8666</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162912-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8666.html</URL>
        <Description>CVE-2016-8666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001486</URL>
        <Description>SUSE Bug 1001486</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001487</URL>
        <Description>SUSE Bug 1001487</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003964</URL>
        <Description>SUSE Bug 1003964</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
