<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2017:0471-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-02-15T16:20:32Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-02-15T16:20:32Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-02-15T16:20:32Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">

The SUSE Linux Enterprise 12 GA LTSS kernel was updated to 3.12.61 to receive various security and bugfixes.

The following feature was implemented:

- The ext2 filesystem got reenabled and supported to allow support for 'XIP' (Execute In Place) (FATE#320805).


The following security bugs were fixed:

- CVE-2017-5551: The tmpfs filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bsc#1021258).
- CVE-2016-7097: The filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).
- CVE-2017-2583: A Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. A user/process inside guest could have used this flaw to crash the guest resulting in DoS or potentially escalate their privileges inside guest. (bsc#1020602).
- CVE-2017-2584: arch/x86/kvm/emulate.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt (bnc#1019851).
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb truncation, which allowed local users to cause a denial of service (system crash) via a crafted application that made sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c (bnc#1009969).
- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935 (bnc#1014746).
- CVE-2016-9806: Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel allowed local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that made sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated (bnc#1013540).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-7913: The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure (bnc#1010478).
- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2015-8963: Race condition in kernel/events/core.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation (bnc#1010502).
- CVE-2016-7914: The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel did not check whether a slot is a leaf, which allowed local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite (bnc#1010475).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).
- CVE-2016-9083: drivers/vfio/pci/vfio_pci.c in the Linux kernel allowed local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a 'state machine confusion bug (bnc#1007197).
- CVE-2016-9084: drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel misused the kzalloc function, which allowed local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file (bnc#1007197).
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel uses an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).
- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).
- CVE-2016-8658: Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket (bnc#1004462).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-6327: drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation (bnc#994748).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for remote attackers to hijack TCP sessions via a blind in-window attack (bnc#989152).
- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by changing a certain length value, aka a 'double fetch' vulnerability (bnc#987542).
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986362 bnc#986365).
- CVE-2016-5828: The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms mishandled transactional state, which allowed local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call (bnc#986569).
- CVE-2014-9904: The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel did not properly check for an integer overflow, which allowed local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).

The following non-security bugs were fixed:

- base: make module_create_drivers_dir race-free (bnc#983977).
- btrfs-8448-improve-performance-on-fsync-against-new-inode.patch: Disable (bsc#981597).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).
- btrfs: be more precise on errors when getting an inode from disk (bsc#981038).
- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#994881).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).
- btrfs: fix relocation incorrectly dropping data references (bsc#990384).
- btrfs: handle quota reserve failure properly (bsc#1005666).
- btrfs: improve performance on fsync against new inode after rename/unlink (bsc#981038).
- btrfs: increment ctx-&gt;pos for every emitted or skipped dirent in readdir (bsc#981709).
- btrfs: remove old tree_root dirent processing in btrfs_real_readdir() (bsc#981709).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- ext2: Enable ext2 driver in config files (bsc#976195, fate#320805)
- ext4: Add parameter for tuning handling of ext2 (bsc#976195).
- ext4: Fixup handling for custom configs in tuning.
- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).
- ipv6: Fix improper use or RCU in patches.kabi/ipv6-add-complete-rcu-protection-around-np-opt.kabi.patch. (bsc#961257)
- ipv6: KABI workaround for ipv6: add complete rcu protection around np-&gt;opt.
- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).
- kabi: reintroduce sk_filter (kabi).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kgraft/iscsi-target: Do not block kGraft in iscsi_np kthread (bsc#1010612, fate#313296).
- kgraft/xen: Do not block kGraft in xenbus kthread (bsc#1017410, fate#313296).
- kgr: ignore zombie tasks during the patching (bnc#1008979).
- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- modsign: Print appropriate status message when accessing UEFI variable (bsc#958606).
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).
- mpt3sas: Fix panic when aer correct error occurred (bsc#997708, bsc#999943).
- netfilter: allow logging fron non-init netns (bsc#970083).
- netfilter: bridge: do not leak skb in error paths (bsc#982544).
- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).
- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).
- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- pci/aer: Clear error status registers during enumeration and restore (bsc#985978).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- reiserfs: fix race in prealloc discard (bsc#987576).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: Increase REPORT_LUNS timeout (bsc#982282).
- series.conf: move stray netfilter patches to the right section
- squashfs3: properly handle dir_emit() failures (bsc#998795).
- supported.conf: Add ext2
- timers: Use proper base migration in add_timer_on() (bnc#993392).
- tty: audit: Fix audit source (bsc#1016482).
- tty: Prevent ldisc drivers from re-using stale tty fields (bnc#1010507).
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- xen: Fix refcnt regression in xen netback introduced by changes made for bug#881008 (bnc#978094)
- xfs: allow lazy sb counter sync during filesystem freeze sequence (bsc#980560).
- xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153).
- xfs: fix premature enospc on inode allocation (bsc#984148).
- xfs: get rid of XFS_IALLOC_BLOCKS macros (bsc#984148).
- xfs: get rid of XFS_INODE_CLUSTER_SIZE macros (bsc#984148).
- xfs: refactor xlog_recover_process_data() (bsc#1019300).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
- xhci: silence warnings in switch (bnc#991665).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Module-Public-Cloud-12-2017-247,SUSE-SLE-SAP-12-2017-247,SUSE-SLE-SERVER-12-2017-247</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      <Description>Link for SUSE-SU-2017:0471-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html</URL>
      <Description>E-Mail link for SUSE-SU-2017:0471-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1003153</URL>
      <Description>SUSE Bug 1003153</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1003925</URL>
      <Description>SUSE Bug 1003925</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1004462</URL>
      <Description>SUSE Bug 1004462</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1004517</URL>
      <Description>SUSE Bug 1004517</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1005666</URL>
      <Description>SUSE Bug 1005666</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1007197</URL>
      <Description>SUSE Bug 1007197</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1008833</URL>
      <Description>SUSE Bug 1008833</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1008979</URL>
      <Description>SUSE Bug 1008979</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1009969</URL>
      <Description>SUSE Bug 1009969</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010040</URL>
      <Description>SUSE Bug 1010040</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010475</URL>
      <Description>SUSE Bug 1010475</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010478</URL>
      <Description>SUSE Bug 1010478</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010501</URL>
      <Description>SUSE Bug 1010501</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010502</URL>
      <Description>SUSE Bug 1010502</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010507</URL>
      <Description>SUSE Bug 1010507</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010612</URL>
      <Description>SUSE Bug 1010612</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010711</URL>
      <Description>SUSE Bug 1010711</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010716</URL>
      <Description>SUSE Bug 1010716</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1011820</URL>
      <Description>SUSE Bug 1011820</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1012422</URL>
      <Description>SUSE Bug 1012422</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1013038</URL>
      <Description>SUSE Bug 1013038</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1013531</URL>
      <Description>SUSE Bug 1013531</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1013540</URL>
      <Description>SUSE Bug 1013540</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1013542</URL>
      <Description>SUSE Bug 1013542</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1014746</URL>
      <Description>SUSE Bug 1014746</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1016482</URL>
      <Description>SUSE Bug 1016482</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1017410</URL>
      <Description>SUSE Bug 1017410</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1017589</URL>
      <Description>SUSE Bug 1017589</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1017710</URL>
      <Description>SUSE Bug 1017710</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1019300</URL>
      <Description>SUSE Bug 1019300</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1019851</URL>
      <Description>SUSE Bug 1019851</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1020602</URL>
      <Description>SUSE Bug 1020602</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1021258</URL>
      <Description>SUSE Bug 1021258</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/881008</URL>
      <Description>SUSE Bug 881008</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/915183</URL>
      <Description>SUSE Bug 915183</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/958606</URL>
      <Description>SUSE Bug 958606</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/961257</URL>
      <Description>SUSE Bug 961257</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/970083</URL>
      <Description>SUSE Bug 970083</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/971989</URL>
      <Description>SUSE Bug 971989</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/976195</URL>
      <Description>SUSE Bug 976195</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/978094</URL>
      <Description>SUSE Bug 978094</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/980371</URL>
      <Description>SUSE Bug 980371</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/980560</URL>
      <Description>SUSE Bug 980560</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/981038</URL>
      <Description>SUSE Bug 981038</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/981597</URL>
      <Description>SUSE Bug 981597</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/981709</URL>
      <Description>SUSE Bug 981709</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/982282</URL>
      <Description>SUSE Bug 982282</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/982544</URL>
      <Description>SUSE Bug 982544</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/983619</URL>
      <Description>SUSE Bug 983619</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/983721</URL>
      <Description>SUSE Bug 983721</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/983977</URL>
      <Description>SUSE Bug 983977</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/984148</URL>
      <Description>SUSE Bug 984148</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/984419</URL>
      <Description>SUSE Bug 984419</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/984755</URL>
      <Description>SUSE Bug 984755</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/985978</URL>
      <Description>SUSE Bug 985978</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/986362</URL>
      <Description>SUSE Bug 986362</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/986365</URL>
      <Description>SUSE Bug 986365</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/986445</URL>
      <Description>SUSE Bug 986445</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/986569</URL>
      <Description>SUSE Bug 986569</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/986572</URL>
      <Description>SUSE Bug 986572</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/986811</URL>
      <Description>SUSE Bug 986811</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/986941</URL>
      <Description>SUSE Bug 986941</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/987542</URL>
      <Description>SUSE Bug 987542</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/987565</URL>
      <Description>SUSE Bug 987565</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/987576</URL>
      <Description>SUSE Bug 987576</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/989152</URL>
      <Description>SUSE Bug 989152</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/990384</URL>
      <Description>SUSE Bug 990384</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/991608</URL>
      <Description>SUSE Bug 991608</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/991665</URL>
      <Description>SUSE Bug 991665</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/993392</URL>
      <Description>SUSE Bug 993392</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/993890</URL>
      <Description>SUSE Bug 993890</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/993891</URL>
      <Description>SUSE Bug 993891</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/994296</URL>
      <Description>SUSE Bug 994296</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/994748</URL>
      <Description>SUSE Bug 994748</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/994881</URL>
      <Description>SUSE Bug 994881</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/995968</URL>
      <Description>SUSE Bug 995968</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/997708</URL>
      <Description>SUSE Bug 997708</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/998795</URL>
      <Description>SUSE Bug 998795</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/999584</URL>
      <Description>SUSE Bug 999584</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/999600</URL>
      <Description>SUSE Bug 999600</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/999932</URL>
      <Description>SUSE Bug 999932</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/999943</URL>
      <Description>SUSE Bug 999943</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9904/</URL>
      <Description>SUSE CVE CVE-2014-9904 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8956/</URL>
      <Description>SUSE CVE CVE-2015-8956 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8962/</URL>
      <Description>SUSE CVE CVE-2015-8962 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8963/</URL>
      <Description>SUSE CVE CVE-2015-8963 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8964/</URL>
      <Description>SUSE CVE CVE-2015-8964 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10088/</URL>
      <Description>SUSE CVE CVE-2016-10088 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4470/</URL>
      <Description>SUSE CVE CVE-2016-4470 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4997/</URL>
      <Description>SUSE CVE CVE-2016-4997 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5696/</URL>
      <Description>SUSE CVE CVE-2016-5696 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5828/</URL>
      <Description>SUSE CVE CVE-2016-5828 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5829/</URL>
      <Description>SUSE CVE CVE-2016-5829 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6130/</URL>
      <Description>SUSE CVE CVE-2016-6130 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6327/</URL>
      <Description>SUSE CVE CVE-2016-6327 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6480/</URL>
      <Description>SUSE CVE CVE-2016-6480 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6828/</URL>
      <Description>SUSE CVE CVE-2016-6828 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7042/</URL>
      <Description>SUSE CVE CVE-2016-7042 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7097/</URL>
      <Description>SUSE CVE CVE-2016-7097 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7425/</URL>
      <Description>SUSE CVE CVE-2016-7425 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7910/</URL>
      <Description>SUSE CVE CVE-2016-7910 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7911/</URL>
      <Description>SUSE CVE CVE-2016-7911 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7913/</URL>
      <Description>SUSE CVE CVE-2016-7913 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7914/</URL>
      <Description>SUSE CVE CVE-2016-7914 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8399/</URL>
      <Description>SUSE CVE CVE-2016-8399 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8633/</URL>
      <Description>SUSE CVE CVE-2016-8633 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8645/</URL>
      <Description>SUSE CVE CVE-2016-8645 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8658/</URL>
      <Description>SUSE CVE CVE-2016-8658 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9083/</URL>
      <Description>SUSE CVE CVE-2016-9083 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9084/</URL>
      <Description>SUSE CVE CVE-2016-9084 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9756/</URL>
      <Description>SUSE CVE CVE-2016-9756 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9793/</URL>
      <Description>SUSE CVE CVE-2016-9793 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9806/</URL>
      <Description>SUSE CVE CVE-2016-9806 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2583/</URL>
      <Description>SUSE CVE CVE-2017-2583 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2584/</URL>
      <Description>SUSE CVE CVE-2017-2584 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5551/</URL>
      <Description>SUSE CVE CVE-2017-5551 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Public Cloud 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Public Cloud 12">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 12" CPE="cpe:/o:suse:sle-module-public-cloud:12">SUSE Linux Enterprise Module for Public Cloud 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS" CPE="cpe:/o:suse:sles-ltss:12">SUSE Linux Enterprise Server 12-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12" CPE="cpe:/o:suse:sles_sap:12">SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-3.12.61-52.66.1">
      <FullProductName ProductID="kernel-ec2-3.12.61-52.66.1">kernel-ec2-3.12.61-52.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-devel-3.12.61-52.66.1">
      <FullProductName ProductID="kernel-ec2-devel-3.12.61-52.66.1">kernel-ec2-devel-3.12.61-52.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-extra-3.12.61-52.66.1">
      <FullProductName ProductID="kernel-ec2-extra-3.12.61-52.66.1">kernel-ec2-extra-3.12.61-52.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-3.12.61-52.66.1">
      <FullProductName ProductID="kernel-default-3.12.61-52.66.1">kernel-default-3.12.61-52.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-3.12.61-52.66.1">
      <FullProductName ProductID="kernel-default-base-3.12.61-52.66.1">kernel-default-base-3.12.61-52.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-3.12.61-52.66.1">
      <FullProductName ProductID="kernel-default-devel-3.12.61-52.66.1">kernel-default-devel-3.12.61-52.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-3.12.61-52.66.1">
      <FullProductName ProductID="kernel-devel-3.12.61-52.66.1">kernel-devel-3.12.61-52.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-macros-3.12.61-52.66.1">
      <FullProductName ProductID="kernel-macros-3.12.61-52.66.1">kernel-macros-3.12.61-52.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-3.12.61-52.66.1">
      <FullProductName ProductID="kernel-source-3.12.61-52.66.1">kernel-source-3.12.61-52.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-3.12.61-52.66.1">
      <FullProductName ProductID="kernel-syms-3.12.61-52.66.1">kernel-syms-3.12.61-52.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-3.12.61-52.66.1">
      <FullProductName ProductID="kernel-xen-3.12.61-52.66.1">kernel-xen-3.12.61-52.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-base-3.12.61-52.66.1">
      <FullProductName ProductID="kernel-xen-base-3.12.61-52.66.1">kernel-xen-base-3.12.61-52.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-devel-3.12.61-52.66.1">
      <FullProductName ProductID="kernel-xen-devel-3.12.61-52.66.1">kernel-xen-devel-3.12.61-52.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-3_12_61-52_66-default-1-2.1">
      <FullProductName ProductID="kgraft-patch-3_12_61-52_66-default-1-2.1">kgraft-patch-3_12_61-52_66-default-1-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-3_12_61-52_66-xen-1-2.1">
      <FullProductName ProductID="kgraft-patch-3_12_61-52_66-xen-1-2.1">kgraft-patch-3_12_61-52_66-xen-1-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-man-3.12.61-52.66.1">
      <FullProductName ProductID="kernel-default-man-3.12.61-52.66.1">kernel-default-man-3.12.61-52.66.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-ec2-3.12.61-52.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Public Cloud 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1">kernel-ec2-3.12.61-52.66.1 as a component of SUSE Linux Enterprise Module for Public Cloud 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-devel-3.12.61-52.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Public Cloud 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1">kernel-ec2-devel-3.12.61-52.66.1 as a component of SUSE Linux Enterprise Module for Public Cloud 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-extra-3.12.61-52.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Public Cloud 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1">kernel-ec2-extra-3.12.61-52.66.1 as a component of SUSE Linux Enterprise Module for Public Cloud 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-3.12.61-52.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1">kernel-default-3.12.61-52.66.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-3.12.61-52.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1">kernel-default-base-3.12.61-52.66.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-3.12.61-52.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1">kernel-default-devel-3.12.61-52.66.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-man-3.12.61-52.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1">kernel-default-man-3.12.61-52.66.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-3.12.61-52.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1">kernel-devel-3.12.61-52.66.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-3.12.61-52.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1">kernel-macros-3.12.61-52.66.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-3.12.61-52.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1">kernel-source-3.12.61-52.66.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-3.12.61-52.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1">kernel-syms-3.12.61-52.66.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-3.12.61-52.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1">kernel-xen-3.12.61-52.66.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-base-3.12.61-52.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1">kernel-xen-base-3.12.61-52.66.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-devel-3.12.61-52.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1">kernel-xen-devel-3.12.61-52.66.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kgraft-patch-3_12_61-52_66-default-1-2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1">kgraft-patch-3_12_61-52_66-default-1-2.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kgraft-patch-3_12_61-52_66-xen-1-2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1">kgraft-patch-3_12_61-52_66-xen-1-2.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-3.12.61-52.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1">kernel-default-3.12.61-52.66.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-3.12.61-52.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1">kernel-default-base-3.12.61-52.66.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-3.12.61-52.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1">kernel-default-devel-3.12.61-52.66.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-3.12.61-52.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1">kernel-devel-3.12.61-52.66.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-3.12.61-52.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1">kernel-macros-3.12.61-52.66.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-3.12.61-52.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1">kernel-source-3.12.61-52.66.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-3.12.61-52.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1">kernel-syms-3.12.61-52.66.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-3.12.61-52.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1">kernel-xen-3.12.61-52.66.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-base-3.12.61-52.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1">kernel-xen-base-3.12.61-52.66.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-devel-3.12.61-52.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1">kernel-xen-devel-3.12.61-52.66.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kgraft-patch-3_12_61-52_66-default-1-2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1">kgraft-patch-3_12_61-52_66-default-1-2.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kgraft-patch-3_12_61-52_66-xen-1-2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1">kgraft-patch-3_12_61-52_66-xen-1-2.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel before 3.17 does not properly check for an integer overflow, which allows local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call.</Note>
    </Notes>
    <CVE>CVE-2014-9904</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.1</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9904.html</URL>
        <Description>CVE-2014-9904</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986811</URL>
        <Description>SUSE Bug 986811</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986941</URL>
        <Description>SUSE Bug 986941</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.</Note>
    </Notes>
    <CVE>CVE-2015-8956</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8956.html</URL>
        <Description>CVE-2015-8956</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003925</URL>
        <Description>SUSE Bug 1003925</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.</Note>
    </Notes>
    <CVE>CVE-2015-8962</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.9</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8962.html</URL>
        <Description>CVE-2015-8962</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010501</URL>
        <Description>SUSE Bug 1010501</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.</Note>
    </Notes>
    <CVE>CVE-2015-8963</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:P/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8963.html</URL>
        <Description>CVE-2015-8963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010502</URL>
        <Description>SUSE Bug 1010502</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.</Note>
    </Notes>
    <CVE>CVE-2015-8964</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8964.html</URL>
        <Description>CVE-2015-8964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010507</URL>
        <Description>SUSE Bug 1010507</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.</Note>
    </Notes>
    <CVE>CVE-2016-10088</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10088.html</URL>
        <Description>CVE-2016-10088</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013604</URL>
        <Description>SUSE Bug 1013604</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014271</URL>
        <Description>SUSE Bug 1014271</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1017710</URL>
        <Description>SUSE Bug 1017710</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1019079</URL>
        <Description>SUSE Bug 1019079</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.</Note>
    </Notes>
    <CVE>CVE-2016-4470</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4470.html</URL>
        <Description>CVE-2016-4470</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020452</URL>
        <Description>SUSE Bug 1020452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984755</URL>
        <Description>SUSE Bug 984755</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984764</URL>
        <Description>SUSE Bug 984764</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991651</URL>
        <Description>SUSE Bug 991651</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.</Note>
    </Notes>
    <CVE>CVE-2016-4997</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4997.html</URL>
        <Description>CVE-2016-4997</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020452</URL>
        <Description>SUSE Bug 1020452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986362</URL>
        <Description>SUSE Bug 986362</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986365</URL>
        <Description>SUSE Bug 986365</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986377</URL>
        <Description>SUSE Bug 986377</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991651</URL>
        <Description>SUSE Bug 991651</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.</Note>
    </Notes>
    <CVE>CVE-2016-5696</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5696.html</URL>
        <Description>CVE-2016-5696</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020452</URL>
        <Description>SUSE Bug 1020452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175721</URL>
        <Description>SUSE Bug 1175721</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989152</URL>
        <Description>SUSE Bug 989152</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel through 4.6.3 on powerpc platforms mishandles transactional state, which allows local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call.</Note>
    </Notes>
    <CVE>CVE-2016-5828</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5828.html</URL>
        <Description>CVE-2016-5828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986569</URL>
        <Description>SUSE Bug 986569</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991065</URL>
        <Description>SUSE Bug 991065</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.</Note>
    </Notes>
    <CVE>CVE-2016-5829</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5829.html</URL>
        <Description>CVE-2016-5829</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053919</URL>
        <Description>SUSE Bug 1053919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1054127</URL>
        <Description>SUSE Bug 1054127</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986572</URL>
        <Description>SUSE Bug 986572</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986573</URL>
        <Description>SUSE Bug 986573</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991651</URL>
        <Description>SUSE Bug 991651</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a "double fetch" vulnerability.</Note>
    </Notes>
    <CVE>CVE-2016-6130</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.4</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6130.html</URL>
        <Description>CVE-2016-6130</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/987542</URL>
        <Description>SUSE Bug 987542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation.</Note>
    </Notes>
    <CVE>CVE-2016-6327</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6327.html</URL>
        <Description>CVE-2016-6327</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/994748</URL>
        <Description>SUSE Bug 994748</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability.</Note>
    </Notes>
    <CVE>CVE-2016-6480</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6480.html</URL>
        <Description>CVE-2016-6480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004418</URL>
        <Description>SUSE Bug 1004418</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991608</URL>
        <Description>SUSE Bug 991608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991667</URL>
        <Description>SUSE Bug 991667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/992568</URL>
        <Description>SUSE Bug 992568</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.</Note>
    </Notes>
    <CVE>CVE-2016-6828</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6828.html</URL>
        <Description>CVE-2016-6828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052256</URL>
        <Description>SUSE Bug 1052256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/994296</URL>
        <Description>SUSE Bug 994296</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.</Note>
    </Notes>
    <CVE>CVE-2016-7042</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7042.html</URL>
        <Description>CVE-2016-7042</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004517</URL>
        <Description>SUSE Bug 1004517</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.</Note>
    </Notes>
    <CVE>CVE-2016-7097</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7097.html</URL>
        <Description>CVE-2016-7097</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021258</URL>
        <Description>SUSE Bug 1021258</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052256</URL>
        <Description>SUSE Bug 1052256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/870618</URL>
        <Description>SUSE Bug 870618</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/995968</URL>
        <Description>SUSE Bug 995968</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.</Note>
    </Notes>
    <CVE>CVE-2016-7425</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7425.html</URL>
        <Description>CVE-2016-7425</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999932</URL>
        <Description>SUSE Bug 999932</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.</Note>
    </Notes>
    <CVE>CVE-2016-7910</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7910.html</URL>
        <Description>CVE-2016-7910</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010716</URL>
        <Description>SUSE Bug 1010716</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196722</URL>
        <Description>SUSE Bug 1196722</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.</Note>
    </Notes>
    <CVE>CVE-2016-7911</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7911.html</URL>
        <Description>CVE-2016-7911</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010711</URL>
        <Description>SUSE Bug 1010711</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010713</URL>
        <Description>SUSE Bug 1010713</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure.</Note>
    </Notes>
    <CVE>CVE-2016-7913</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7913.html</URL>
        <Description>CVE-2016-7913</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010478</URL>
        <Description>SUSE Bug 1010478</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.5.3 does not check whether a slot is a leaf, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite.</Note>
    </Notes>
    <CVE>CVE-2016-7914</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7914.html</URL>
        <Description>CVE-2016-7914</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010475</URL>
        <Description>SUSE Bug 1010475</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.</Note>
    </Notes>
    <CVE>CVE-2016-8399</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.2</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8399.html</URL>
        <Description>CVE-2016-8399</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014746</URL>
        <Description>SUSE Bug 1014746</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.</Note>
    </Notes>
    <CVE>CVE-2016-8633</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8633.html</URL>
        <Description>CVE-2016-8633</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008833</URL>
        <Description>SUSE Bug 1008833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TCP stack in the Linux kernel before 4.8.10 mishandles skb truncation, which allows local users to cause a denial of service (system crash) via a crafted application that makes sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c.</Note>
    </Notes>
    <CVE>CVE-2016-8645</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8645.html</URL>
        <Description>CVE-2016-8645</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009969</URL>
        <Description>SUSE Bug 1009969</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.7.5 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket.</Note>
    </Notes>
    <CVE>CVE-2016-8658</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8658.html</URL>
        <Description>CVE-2016-8658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004462</URL>
        <Description>SUSE Bug 1004462</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/vfio/pci/vfio_pci.c in the Linux kernel through 4.8.11 allows local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a "state machine confusion bug."</Note>
    </Notes>
    <CVE>CVE-2016-9083</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9083.html</URL>
        <Description>CVE-2016-9083</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007197</URL>
        <Description>SUSE Bug 1007197</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel through 4.8.11 misuses the kzalloc function, which allows local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file.</Note>
    </Notes>
    <CVE>CVE-2016-9084</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9084.html</URL>
        <Description>CVE-2016-9084</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007197</URL>
        <Description>SUSE Bug 1007197</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.</Note>
    </Notes>
    <CVE>CVE-2016-9756</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9756.html</URL>
        <Description>CVE-2016-9756</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013038</URL>
        <Description>SUSE Bug 1013038</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.</Note>
    </Notes>
    <CVE>CVE-2016-9793</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.9</BaseScore>
        <Vector>AV:L/AC:H/Au:M/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9793.html</URL>
        <Description>CVE-2016-9793</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013531</URL>
        <Description>SUSE Bug 1013531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013542</URL>
        <Description>SUSE Bug 1013542</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel before 4.6.3 allows local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that makes sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated.</Note>
    </Notes>
    <CVE>CVE-2016-9806</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9806.html</URL>
        <Description>CVE-2016-9806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013540</URL>
        <Description>SUSE Bug 1013540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1017589</URL>
        <Description>SUSE Bug 1017589</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The load_segment_descriptor implementation in arch/x86/kvm/emulate.c in the Linux kernel before 4.9.5 improperly emulates a "MOV SS, NULL selector" instruction, which allows guest OS users to cause a denial of service (guest OS crash) or gain guest OS privileges via a crafted application.</Note>
    </Notes>
    <CVE>CVE-2017-2583</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.4</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2583.html</URL>
        <Description>CVE-2017-2583</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020602</URL>
        <Description>SUSE Bug 1020602</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1030573</URL>
        <Description>SUSE Bug 1030573</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt.</Note>
    </Notes>
    <CVE>CVE-2017-2584</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.2</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2584.html</URL>
        <Description>CVE-2017-2584</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1019851</URL>
        <Description>SUSE Bug 1019851</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.</Note>
    </Notes>
    <CVE>CVE-2017-5551</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5551.html</URL>
        <Description>CVE-2017-5551</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021258</URL>
        <Description>SUSE Bug 1021258</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/995968</URL>
        <Description>SUSE Bug 995968</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
