<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2018:3618-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-11-05T12:59:04Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-11-05T12:59:04Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-11-05T12:59:04Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">

The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bnc#1107829).
- CVE-2018-14617: There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory (bnc#1102870).
- CVE-2018-16276: An issue was discovered in yurex_read in drivers/usb/misc/yurex.c where local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges (bnc#1106095).
- CVE-2018-12896: An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically made the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922).

The following non-security bugs were fixed:

- net: fix neighbours after MAC change (bnc#905299).
- powerpc: Fix smp_mb__before_spinlock() (bsc#1110247).
- x86/fpu: Do not do __thread_fpu_end() if use_eager_fpu() (bnc#1109967).
- x86/fpu: fix signal handling with eager FPU switching (ia32) (bsc#1108227).
- retpoline: Introduce start/end markers of indirect thunk (bsc#1113337).

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">sleposp3-kernel-source-13855,slessp3-kernel-source-13855,slexsp3-kernel-source-13855</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183618-1/</URL>
      <Description>Link for SUSE-SU-2018:3618-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2018-November/004827.html</URL>
      <Description>E-Mail link for SUSE-SU-2018:3618-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1099922</URL>
      <Description>SUSE Bug 1099922</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1102870</URL>
      <Description>SUSE Bug 1102870</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1106095</URL>
      <Description>SUSE Bug 1106095</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1107829</URL>
      <Description>SUSE Bug 1107829</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1108227</URL>
      <Description>SUSE Bug 1108227</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1109967</URL>
      <Description>SUSE Bug 1109967</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1110247</URL>
      <Description>SUSE Bug 1110247</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1113337</URL>
      <Description>SUSE Bug 1113337</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/905299</URL>
      <Description>SUSE Bug 905299</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12896/</URL>
      <Description>SUSE CVE CVE-2018-12896 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14617/</URL>
      <Description>SUSE CVE CVE-2018-14617 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14633/</URL>
      <Description>SUSE CVE CVE-2018-14633 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16276/</URL>
      <Description>SUSE CVE CVE-2018-16276 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Point of Sale 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Point of Sale 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3" CPE="cpe:/o:suse:sle-pos:11:sp3">SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP3-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS" CPE="cpe:/o:suse:suse_sles_ltss:11:sp3">SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-3.0.101-0.47.106.56.1">
      <FullProductName ProductID="kernel-default-3.0.101-0.47.106.56.1">kernel-default-3.0.101-0.47.106.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-3.0.101-0.47.106.56.1">
      <FullProductName ProductID="kernel-default-base-3.0.101-0.47.106.56.1">kernel-default-base-3.0.101-0.47.106.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-3.0.101-0.47.106.56.1">
      <FullProductName ProductID="kernel-default-devel-3.0.101-0.47.106.56.1">kernel-default-devel-3.0.101-0.47.106.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-3.0.101-0.47.106.56.1">
      <FullProductName ProductID="kernel-ec2-3.0.101-0.47.106.56.1">kernel-ec2-3.0.101-0.47.106.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-base-3.0.101-0.47.106.56.1">
      <FullProductName ProductID="kernel-ec2-base-3.0.101-0.47.106.56.1">kernel-ec2-base-3.0.101-0.47.106.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-devel-3.0.101-0.47.106.56.1">
      <FullProductName ProductID="kernel-ec2-devel-3.0.101-0.47.106.56.1">kernel-ec2-devel-3.0.101-0.47.106.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-3.0.101-0.47.106.56.1">
      <FullProductName ProductID="kernel-pae-3.0.101-0.47.106.56.1">kernel-pae-3.0.101-0.47.106.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-base-3.0.101-0.47.106.56.1">
      <FullProductName ProductID="kernel-pae-base-3.0.101-0.47.106.56.1">kernel-pae-base-3.0.101-0.47.106.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-devel-3.0.101-0.47.106.56.1">
      <FullProductName ProductID="kernel-pae-devel-3.0.101-0.47.106.56.1">kernel-pae-devel-3.0.101-0.47.106.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-3.0.101-0.47.106.56.1">
      <FullProductName ProductID="kernel-source-3.0.101-0.47.106.56.1">kernel-source-3.0.101-0.47.106.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-3.0.101-0.47.106.56.1">
      <FullProductName ProductID="kernel-syms-3.0.101-0.47.106.56.1">kernel-syms-3.0.101-0.47.106.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-3.0.101-0.47.106.56.1">
      <FullProductName ProductID="kernel-trace-3.0.101-0.47.106.56.1">kernel-trace-3.0.101-0.47.106.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-base-3.0.101-0.47.106.56.1">
      <FullProductName ProductID="kernel-trace-base-3.0.101-0.47.106.56.1">kernel-trace-base-3.0.101-0.47.106.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-devel-3.0.101-0.47.106.56.1">
      <FullProductName ProductID="kernel-trace-devel-3.0.101-0.47.106.56.1">kernel-trace-devel-3.0.101-0.47.106.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-3.0.101-0.47.106.56.1">
      <FullProductName ProductID="kernel-xen-3.0.101-0.47.106.56.1">kernel-xen-3.0.101-0.47.106.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-base-3.0.101-0.47.106.56.1">
      <FullProductName ProductID="kernel-xen-base-3.0.101-0.47.106.56.1">kernel-xen-base-3.0.101-0.47.106.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-devel-3.0.101-0.47.106.56.1">
      <FullProductName ProductID="kernel-xen-devel-3.0.101-0.47.106.56.1">kernel-xen-devel-3.0.101-0.47.106.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-bigsmp-3.0.101-0.47.106.56.1">
      <FullProductName ProductID="kernel-bigsmp-3.0.101-0.47.106.56.1">kernel-bigsmp-3.0.101-0.47.106.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-bigsmp-base-3.0.101-0.47.106.56.1">
      <FullProductName ProductID="kernel-bigsmp-base-3.0.101-0.47.106.56.1">kernel-bigsmp-base-3.0.101-0.47.106.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-bigsmp-devel-3.0.101-0.47.106.56.1">
      <FullProductName ProductID="kernel-bigsmp-devel-3.0.101-0.47.106.56.1">kernel-bigsmp-devel-3.0.101-0.47.106.56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-man-3.0.101-0.47.106.56.1">
      <FullProductName ProductID="kernel-default-man-3.0.101-0.47.106.56.1">kernel-default-man-3.0.101-0.47.106.56.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-default-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.56.1">kernel-default-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.56.1">kernel-default-base-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.56.1">kernel-default-devel-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.56.1">kernel-ec2-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-base-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.56.1">kernel-ec2-base-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-devel-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.56.1">kernel-ec2-devel-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.56.1">kernel-pae-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-base-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.56.1">kernel-pae-base-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-devel-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.56.1">kernel-pae-devel-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.56.1">kernel-source-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.56.1">kernel-syms-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-trace-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.56.1">kernel-trace-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-trace-base-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.56.1">kernel-trace-base-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-trace-devel-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.56.1">kernel-trace-devel-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.56.1">kernel-xen-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-base-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.56.1">kernel-xen-base-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-devel-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.56.1">kernel-xen-devel-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-bigsmp-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.56.1">kernel-bigsmp-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-bigsmp-base-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.56.1">kernel-bigsmp-base-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-bigsmp-devel-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.56.1">kernel-bigsmp-devel-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.56.1">kernel-default-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.56.1">kernel-default-base-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.56.1">kernel-default-devel-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-man-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.56.1">kernel-default-man-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.56.1">kernel-ec2-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-base-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.56.1">kernel-ec2-base-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-devel-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.56.1">kernel-ec2-devel-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.56.1">kernel-pae-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-base-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.56.1">kernel-pae-base-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-devel-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.56.1">kernel-pae-devel-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.56.1">kernel-source-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.56.1">kernel-syms-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-trace-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.56.1">kernel-trace-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-trace-base-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.56.1">kernel-trace-base-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-trace-devel-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.56.1">kernel-trace-devel-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.56.1">kernel-xen-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-base-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.56.1">kernel-xen-base-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-devel-3.0.101-0.47.106.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.56.1">kernel-xen-devel-3.0.101-0.47.106.56.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.</Note>
    </Notes>
    <CVE>CVE-2018-12896</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183618-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12896.html</URL>
        <Description>CVE-2018-12896</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1099922</URL>
        <Description>SUSE Bug 1099922</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory.</Note>
    </Notes>
    <CVE>CVE-2018-14617</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183618-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14617.html</URL>
        <Description>CVE-2018-14617</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1102870</URL>
        <Description>SUSE Bug 1102870</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.</Note>
    </Notes>
    <CVE>CVE-2018-14633</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183618-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14633.html</URL>
        <Description>CVE-2018-14633</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107829</URL>
        <Description>SUSE Bug 1107829</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107832</URL>
        <Description>SUSE Bug 1107832</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in yurex_read in drivers/usb/misc/yurex.c in the Linux kernel before 4.17.7. Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges.</Note>
    </Notes>
    <CVE>CVE-2018-16276</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183618-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16276.html</URL>
        <Description>CVE-2018-16276</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106095</URL>
        <Description>SUSE Bug 1106095</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115593</URL>
        <Description>SUSE Bug 1115593</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
