<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">kernel-debug-4.8.13-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10128</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">kernel-debug-4.8.13-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the kernel-debug-4.8.13-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10128</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10128</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-3939/</URL>
      <Description>SUSE CVE CVE-2009-3939 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-4026/</URL>
      <Description>SUSE CVE CVE-2009-4026 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-4027/</URL>
      <Description>SUSE CVE CVE-2009-4027 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-4131/</URL>
      <Description>SUSE CVE CVE-2009-4131 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-4138/</URL>
      <Description>SUSE CVE CVE-2009-4138 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-4536/</URL>
      <Description>SUSE CVE CVE-2009-4536 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-4538/</URL>
      <Description>SUSE CVE CVE-2009-4538 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-1146/</URL>
      <Description>SUSE CVE CVE-2010-1146 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-1436/</URL>
      <Description>SUSE CVE CVE-2010-1436 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-1641/</URL>
      <Description>SUSE CVE CVE-2010-1641 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-2066/</URL>
      <Description>SUSE CVE CVE-2010-2066 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-2942/</URL>
      <Description>SUSE CVE CVE-2010-2942 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-2954/</URL>
      <Description>SUSE CVE CVE-2010-2954 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-2955/</URL>
      <Description>SUSE CVE CVE-2010-2955 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-3081/</URL>
      <Description>SUSE CVE CVE-2010-3081 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-3296/</URL>
      <Description>SUSE CVE CVE-2010-3296 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-3297/</URL>
      <Description>SUSE CVE CVE-2010-3297 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-3298/</URL>
      <Description>SUSE CVE CVE-2010-3298 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-3301/</URL>
      <Description>SUSE CVE CVE-2010-3301 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-3310/</URL>
      <Description>SUSE CVE CVE-2010-3310 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-0711/</URL>
      <Description>SUSE CVE CVE-2011-0711 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-0712/</URL>
      <Description>SUSE CVE CVE-2011-0712 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1020/</URL>
      <Description>SUSE CVE CVE-2011-1020 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1180/</URL>
      <Description>SUSE CVE CVE-2011-1180 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1577/</URL>
      <Description>SUSE CVE CVE-2011-1577 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1581/</URL>
      <Description>SUSE CVE CVE-2011-1581 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-2203/</URL>
      <Description>SUSE CVE CVE-2011-2203 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-4604/</URL>
      <Description>SUSE CVE CVE-2011-4604 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-0056/</URL>
      <Description>SUSE CVE CVE-2012-0056 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-3412/</URL>
      <Description>SUSE CVE CVE-2012-3412 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-3520/</URL>
      <Description>SUSE CVE CVE-2012-3520 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-0160/</URL>
      <Description>SUSE CVE CVE-2013-0160 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-0231/</URL>
      <Description>SUSE CVE CVE-2013-0231 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-0913/</URL>
      <Description>SUSE CVE CVE-2013-0913 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2850/</URL>
      <Description>SUSE CVE CVE-2013-2850 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0038/</URL>
      <Description>SUSE CVE CVE-2014-0038 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0196/</URL>
      <Description>SUSE CVE CVE-2014-0196 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0691/</URL>
      <Description>SUSE CVE CVE-2014-0691 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-8133/</URL>
      <Description>SUSE CVE CVE-2014-8133 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1333/</URL>
      <Description>SUSE CVE CVE-2015-1333 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7550/</URL>
      <Description>SUSE CVE CVE-2015-7550 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7884/</URL>
      <Description>SUSE CVE CVE-2015-7884 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7885/</URL>
      <Description>SUSE CVE CVE-2015-7885 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8539/</URL>
      <Description>SUSE CVE CVE-2015-8539 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8660/</URL>
      <Description>SUSE CVE CVE-2015-8660 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0723/</URL>
      <Description>SUSE CVE CVE-2016-0723 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0728/</URL>
      <Description>SUSE CVE CVE-2016-0728 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-1237/</URL>
      <Description>SUSE CVE CVE-2016-1237 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-1583/</URL>
      <Description>SUSE CVE CVE-2016-1583 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2184/</URL>
      <Description>SUSE CVE CVE-2016-2184 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2185/</URL>
      <Description>SUSE CVE CVE-2016-2185 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2186/</URL>
      <Description>SUSE CVE CVE-2016-2186 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2384/</URL>
      <Description>SUSE CVE CVE-2016-2384 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3134/</URL>
      <Description>SUSE CVE CVE-2016-3134 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3135/</URL>
      <Description>SUSE CVE CVE-2016-3135 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3136/</URL>
      <Description>SUSE CVE CVE-2016-3136 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3140/</URL>
      <Description>SUSE CVE CVE-2016-3140 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3689/</URL>
      <Description>SUSE CVE CVE-2016-3689 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3713/</URL>
      <Description>SUSE CVE CVE-2016-3713 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4470/</URL>
      <Description>SUSE CVE CVE-2016-4470 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4485/</URL>
      <Description>SUSE CVE CVE-2016-4485 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4486/</URL>
      <Description>SUSE CVE CVE-2016-4486 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4557/</URL>
      <Description>SUSE CVE CVE-2016-4557 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4558/</URL>
      <Description>SUSE CVE CVE-2016-4558 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4569/</URL>
      <Description>SUSE CVE CVE-2016-4569 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4578/</URL>
      <Description>SUSE CVE CVE-2016-4578 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4951/</URL>
      <Description>SUSE CVE CVE-2016-4951 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4997/</URL>
      <Description>SUSE CVE CVE-2016-4997 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4998/</URL>
      <Description>SUSE CVE CVE-2016-4998 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5195/</URL>
      <Description>SUSE CVE CVE-2016-5195 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5244/</URL>
      <Description>SUSE CVE CVE-2016-5244 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5829/</URL>
      <Description>SUSE CVE CVE-2016-5829 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6187/</URL>
      <Description>SUSE CVE CVE-2016-6187 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6480/</URL>
      <Description>SUSE CVE CVE-2016-6480 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6516/</URL>
      <Description>SUSE CVE CVE-2016-6516 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6828/</URL>
      <Description>SUSE CVE CVE-2016-6828 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7039/</URL>
      <Description>SUSE CVE CVE-2016-7039 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7042/</URL>
      <Description>SUSE CVE CVE-2016-7042 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7425/</URL>
      <Description>SUSE CVE CVE-2016-7425 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7913/</URL>
      <Description>SUSE CVE CVE-2016-7913 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9555/</URL>
      <Description>SUSE CVE CVE-2016-9555 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9576/</URL>
      <Description>SUSE CVE CVE-2016-9576 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-4.8.13-1.1">
      <FullProductName ProductID="kernel-debug-4.8.13-1.1">kernel-debug-4.8.13-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-base-4.8.13-1.1">
      <FullProductName ProductID="kernel-debug-base-4.8.13-1.1">kernel-debug-base-4.8.13-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-devel-4.8.13-1.1">
      <FullProductName ProductID="kernel-debug-devel-4.8.13-1.1">kernel-debug-devel-4.8.13-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-4.8.13-1.1">
      <FullProductName ProductID="kernel-default-4.8.13-1.1">kernel-default-4.8.13-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-4.8.13-1.1">
      <FullProductName ProductID="kernel-default-base-4.8.13-1.1">kernel-default-base-4.8.13-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-4.8.13-1.1">
      <FullProductName ProductID="kernel-default-devel-4.8.13-1.1">kernel-default-devel-4.8.13-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-4.8.13-1.1">
      <FullProductName ProductID="kernel-devel-4.8.13-1.1">kernel-devel-4.8.13-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-4.8.13-1.1">
      <FullProductName ProductID="kernel-docs-4.8.13-1.1">kernel-docs-4.8.13-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-html-4.8.13-1.1">
      <FullProductName ProductID="kernel-docs-html-4.8.13-1.1">kernel-docs-html-4.8.13-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-pdf-4.8.13-1.1">
      <FullProductName ProductID="kernel-docs-pdf-4.8.13-1.1">kernel-docs-pdf-4.8.13-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-macros-4.8.13-1.1">
      <FullProductName ProductID="kernel-macros-4.8.13-1.1">kernel-macros-4.8.13-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-build-4.8.13-1.1">
      <FullProductName ProductID="kernel-obs-build-4.8.13-1.1">kernel-obs-build-4.8.13-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-qa-4.8.13-1.1">
      <FullProductName ProductID="kernel-obs-qa-4.8.13-1.1">kernel-obs-qa-4.8.13-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-4.8.13-1.1">
      <FullProductName ProductID="kernel-pae-4.8.13-1.1">kernel-pae-4.8.13-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-base-4.8.13-1.1">
      <FullProductName ProductID="kernel-pae-base-4.8.13-1.1">kernel-pae-base-4.8.13-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-devel-4.8.13-1.1">
      <FullProductName ProductID="kernel-pae-devel-4.8.13-1.1">kernel-pae-devel-4.8.13-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-4.8.13-1.1">
      <FullProductName ProductID="kernel-source-4.8.13-1.1">kernel-source-4.8.13-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-vanilla-4.8.13-1.1">
      <FullProductName ProductID="kernel-source-vanilla-4.8.13-1.1">kernel-source-vanilla-4.8.13-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-4.8.13-1.1">
      <FullProductName ProductID="kernel-syms-4.8.13-1.1">kernel-syms-4.8.13-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syzkaller-4.8.13-1.1">
      <FullProductName ProductID="kernel-syzkaller-4.8.13-1.1">kernel-syzkaller-4.8.13-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syzkaller-base-4.8.13-1.1">
      <FullProductName ProductID="kernel-syzkaller-base-4.8.13-1.1">kernel-syzkaller-base-4.8.13-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syzkaller-devel-4.8.13-1.1">
      <FullProductName ProductID="kernel-syzkaller-devel-4.8.13-1.1">kernel-syzkaller-devel-4.8.13-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-4.8.13-1.1">
      <FullProductName ProductID="kernel-vanilla-4.8.13-1.1">kernel-vanilla-4.8.13-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-base-4.8.13-1.1">
      <FullProductName ProductID="kernel-vanilla-base-4.8.13-1.1">kernel-vanilla-base-4.8.13-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-devel-4.8.13-1.1">
      <FullProductName ProductID="kernel-vanilla-devel-4.8.13-1.1">kernel-vanilla-devel-4.8.13-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-debug-4.8.13-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-debug-4.8.13-1.1">kernel-debug-4.8.13-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-debug-base-4.8.13-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1">kernel-debug-base-4.8.13-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-debug-devel-4.8.13-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1">kernel-debug-devel-4.8.13-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.8.13-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-default-4.8.13-1.1">kernel-default-4.8.13-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-4.8.13-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1">kernel-default-base-4.8.13-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-4.8.13-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1">kernel-default-devel-4.8.13-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-4.8.13-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-devel-4.8.13-1.1">kernel-devel-4.8.13-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-4.8.13-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-docs-4.8.13-1.1">kernel-docs-4.8.13-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-html-4.8.13-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1">kernel-docs-html-4.8.13-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-pdf-4.8.13-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1">kernel-docs-pdf-4.8.13-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-4.8.13-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-macros-4.8.13-1.1">kernel-macros-4.8.13-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-build-4.8.13-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1">kernel-obs-build-4.8.13-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-qa-4.8.13-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1">kernel-obs-qa-4.8.13-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-4.8.13-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-pae-4.8.13-1.1">kernel-pae-4.8.13-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-base-4.8.13-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1">kernel-pae-base-4.8.13-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-devel-4.8.13-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1">kernel-pae-devel-4.8.13-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-4.8.13-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-source-4.8.13-1.1">kernel-source-4.8.13-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-vanilla-4.8.13-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1">kernel-source-vanilla-4.8.13-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-4.8.13-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-syms-4.8.13-1.1">kernel-syms-4.8.13-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syzkaller-4.8.13-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1">kernel-syzkaller-4.8.13-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syzkaller-base-4.8.13-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1">kernel-syzkaller-base-4.8.13-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syzkaller-devel-4.8.13-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1">kernel-syzkaller-devel-4.8.13-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-vanilla-4.8.13-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1">kernel-vanilla-4.8.13-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-vanilla-base-4.8.13-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1">kernel-vanilla-base-4.8.13-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-vanilla-devel-4.8.13-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1">kernel-vanilla-devel-4.8.13-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.</Note>
    </Notes>
    <CVE>CVE-2009-3939</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-3939.html</URL>
        <Description>CVE-2009-3939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/555173</URL>
        <Description>SUSE Bug 555173</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/557180</URL>
        <Description>SUSE Bug 557180</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (panic) via a crafted Delete Block ACK (aka DELBA) packet, related to an erroneous "code shuffling patch."</Note>
    </Notes>
    <CVE>CVE-2009-4026</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-4026.html</URL>
        <Description>CVE-2009-4026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/558267</URL>
        <Description>SUSE Bug 558267</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (system crash) via a Delete Block ACK (aka DELBA) packet that triggers a certain state change in the absence of an aggregation session.</Note>
    </Notes>
    <CVE>CVE-2009-4027</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-4027.html</URL>
        <Description>CVE-2009-4027</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/558267</URL>
        <Description>SUSE Bug 558267</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The EXT4_IOC_MOVE_EXT (aka move extents) ioctl implementation in the ext4 filesystem in the Linux kernel before 2.6.32-git6 allows local users to overwrite arbitrary files via a crafted request, related to insufficient checks for file permissions.</Note>
    </Notes>
    <CVE>CVE-2009-4131</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-4131.html</URL>
        <Description>CVE-2009-4131</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/561018</URL>
        <Description>SUSE Bug 561018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/564380</URL>
        <Description>SUSE Bug 564380</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/firewire/ohci.c in the Linux kernel before 2.6.32-git9, when packet-per-buffer mode is used, allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unknown other impact via an unspecified ioctl associated with receiving an ISO packet that contains zero in the payload-length field.</Note>
    </Notes>
    <CVE>CVE-2009-4138</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-4138.html</URL>
        <Description>CVE-2009-4138</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/564712</URL>
        <Description>SUSE Bug 564712</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.</Note>
    </Notes>
    <CVE>CVE-2009-4536</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-4536.html</URL>
        <Description>CVE-2009-4536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/567376</URL>
        <Description>SUSE Bug 567376</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/583434</URL>
        <Description>SUSE Bug 583434</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.</Note>
    </Notes>
    <CVE>CVE-2009-4538</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-4538.html</URL>
        <Description>CVE-2009-4538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/567376</URL>
        <Description>SUSE Bug 567376</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Linux kernel 2.6.33.2 and earlier, when a ReiserFS filesystem exists, does not restrict read or write access to the .reiserfs_priv directory, which allows local users to gain privileges by modifying (1) extended attributes or (2) ACLs, as demonstrated by deleting a file under .reiserfs_priv/xattrs/.</Note>
    </Notes>
    <CVE>CVE-2010-1146</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-1146.html</URL>
        <Description>CVE-2010-1146</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/593906</URL>
        <Description>SUSE Bug 593906</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">gfs2 in the Linux kernel 2.6.18, and possibly other versions, does not properly handle when the gfs2_quota struct occupies two separate pages, which allows local users to cause a denial of service (kernel panic) via certain manipulations that cause an out-of-bounds write, as demonstrated by writing from an ext3 file system to a gfs2 file system.</Note>
    </Notes>
    <CVE>CVE-2010-1436</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-1436.html</URL>
        <Description>CVE-2010-1436</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/599957</URL>
        <Description>SUSE Bug 599957</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.</Note>
    </Notes>
    <CVE>CVE-2010-1641</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-1641.html</URL>
        <Description>CVE-2010-1641</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/608576</URL>
        <Description>SUSE Bug 608576</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mext_check_arguments function in fs/ext4/move_extent.c in the Linux kernel before 2.6.35 allows local users to overwrite an append-only file via a MOVE_EXT ioctl call that specifies this file as a donor.</Note>
    </Notes>
    <CVE>CVE-2010-2066</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-2066.html</URL>
        <Description>CVE-2010-2066</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/612457</URL>
        <Description>SUSE Bug 612457</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.</Note>
    </Notes>
    <CVE>CVE-2010-2942</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-2942.html</URL>
        <Description>CVE-2010-2942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/632309</URL>
        <Description>SUSE Bug 632309</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/642324</URL>
        <Description>SUSE Bug 642324</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The irda_bind function in net/irda/af_irda.c in the Linux kernel before 2.6.36-rc3-next-20100901 does not properly handle failure of the irda_open_tsap function, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via multiple unsuccessful calls to bind on an AF_IRDA (aka PF_IRDA) socket.</Note>
    </Notes>
    <CVE>CVE-2010-2954</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-2954.html</URL>
        <Description>CVE-2010-2954</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/636112</URL>
        <Description>SUSE Bug 636112</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size.</Note>
    </Notes>
    <CVE>CVE-2010-2955</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-2955.html</URL>
        <Description>CVE-2010-2955</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/635413</URL>
        <Description>SUSE Bug 635413</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.</Note>
    </Notes>
    <CVE>CVE-2010-3081</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-3081.html</URL>
        <Description>CVE-2010-3081</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/639709</URL>
        <Description>SUSE Bug 639709</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/641575</URL>
        <Description>SUSE Bug 641575</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871595</URL>
        <Description>SUSE Bug 871595</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The cxgb_extension_ioctl function in drivers/net/cxgb3/cxgb3_main.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a CHELSIO_GET_QSET_NUM ioctl call.</Note>
    </Notes>
    <CVE>CVE-2010-3296</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-3296.html</URL>
        <Description>CVE-2010-3296</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/639481</URL>
        <Description>SUSE Bug 639481</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/649187</URL>
        <Description>SUSE Bug 649187</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The eql_g_master_cfg function in drivers/net/eql.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an EQL_GETMASTRCFG ioctl call.</Note>
    </Notes>
    <CVE>CVE-2010-3297</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-3297.html</URL>
        <Description>CVE-2010-3297</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/639482</URL>
        <Description>SUSE Bug 639482</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/649187</URL>
        <Description>SUSE Bug 649187</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The hso_get_count function in drivers/net/usb/hso.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.</Note>
    </Notes>
    <CVE>CVE-2010-3298</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-3298.html</URL>
        <Description>CVE-2010-3298</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/639483</URL>
        <Description>SUSE Bug 639483</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/649187</URL>
        <Description>SUSE Bug 649187</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register. NOTE: this vulnerability exists because of a CVE-2007-4573 regression.</Note>
    </Notes>
    <CVE>CVE-2010-3301</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-3301.html</URL>
        <Description>CVE-2010-3301</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/639708</URL>
        <Description>SUSE Bug 639708</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer signedness errors in net/rose/af_rose.c in the Linux kernel before 2.6.36-rc5-next-20100923 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a rose_getname function call, related to the rose_bind and rose_connect functions.</Note>
    </Notes>
    <CVE>CVE-2010-3310</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-3310.html</URL>
        <Description>CVE-2010-3310</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/640721</URL>
        <Description>SUSE Bug 640721</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xfs_fs_geometry function in fs/xfs/xfs_fsops.c in the Linux kernel before 2.6.38-rc6-git3 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FSGEOMETRY_V1 ioctl call.</Note>
    </Notes>
    <CVE>CVE-2011-0711</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-0711.html</URL>
        <Description>CVE-2011-0711</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/672505</URL>
        <Description>SUSE Bug 672505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/672524</URL>
        <Description>SUSE Bug 672524</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple buffer overflows in the caiaq Native Instruments USB audio functionality in the Linux kernel before 2.6.38-rc4-next-20110215 might allow attackers to cause a denial of service or possibly have unspecified other impact via a long USB device name, related to (1) the snd_usb_caiaq_audio_init function in sound/usb/caiaq/audio.c and (2) the snd_usb_caiaq_midi_init function in sound/usb/caiaq/midi.c.</Note>
    </Notes>
    <CVE>CVE-2011-0712</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-0712.html</URL>
        <Description>CVE-2011-0712</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/672499</URL>
        <Description>SUSE Bug 672499</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.</Note>
    </Notes>
    <CVE>CVE-2011-1020</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1020.html</URL>
        <Description>CVE-2011-1020</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/674982</URL>
        <Description>SUSE Bug 674982</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple stack-based buffer overflows in the iriap_getvaluebyclass_indication function in net/irda/iriap.c in the Linux kernel before 2.6.39 allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging connectivity to an IrDA infrared network and sending a large integer value for a (1) name length or (2) attribute length.</Note>
    </Notes>
    <CVE>CVE-2011-1180</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1180.html</URL>
        <Description>CVE-2011-1180</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/681497</URL>
        <Description>SUSE Bug 681497</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.</Note>
    </Notes>
    <CVE>CVE-2011-1577</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1577.html</URL>
        <Description>CVE-2011-1577</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/687113</URL>
        <Description>SUSE Bug 687113</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/692784</URL>
        <Description>SUSE Bug 692784</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The bond_select_queue function in drivers/net/bonding/bond_main.c in the Linux kernel before 2.6.39, when a network device with a large number of receive queues is installed but the default tx_queues setting is used, does not properly restrict queue indexes, which allows remote attackers to cause a denial of service (BUG and system crash) or possibly have unspecified other impact by sending network traffic.</Note>
    </Notes>
    <CVE>CVE-2011-1581</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1581.html</URL>
        <Description>CVE-2011-1581</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/687116</URL>
        <Description>SUSE Bug 687116</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The hfs_find_init function in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and Oops) by mounting an HFS file system with a malformed MDB extent record.</Note>
    </Notes>
    <CVE>CVE-2011-2203</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-2203.html</URL>
        <Description>CVE-2011-2203</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/699709</URL>
        <Description>SUSE Bug 699709</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The bat_socket_read function in net/batman-adv/icmp_socket.c in the Linux kernel before 3.3 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted batman-adv ICMP packet.</Note>
    </Notes>
    <CVE>CVE-2011-4604</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-4604.html</URL>
        <Description>CVE-2011-4604</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/736149</URL>
        <Description>SUSE Bug 736149</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/&lt;pid&gt;/mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.</Note>
    </Notes>
    <CVE>CVE-2012-0056</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-0056.html</URL>
        <Description>CVE-2012-0056</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171985</URL>
        <Description>SUSE Bug 1171985</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/742028</URL>
        <Description>SUSE Bug 742028</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/742279</URL>
        <Description>SUSE Bug 742279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The sfc (aka Solarflare Solarstorm) driver in the Linux kernel before 3.2.30 allows remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value.</Note>
    </Notes>
    <CVE>CVE-2012-3412</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-3412.html</URL>
        <Description>CVE-2012-3412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/774523</URL>
        <Description>SUSE Bug 774523</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Netlink implementation in the Linux kernel before 3.2.30 does not properly handle messages that lack SCM_CREDENTIALS data, which might allow local users to spoof Netlink communication via a crafted message, as demonstrated by a message to (1) Avahi or (2) NetworkManager.</Note>
    </Notes>
    <CVE>CVE-2012-3520</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-3520.html</URL>
        <Description>CVE-2012-3520</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/776925</URL>
        <Description>SUSE Bug 776925</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Linux kernel through 3.7.9 allows local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device.</Note>
    </Notes>
    <CVE>CVE-2013-0160</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-0160.html</URL>
        <Description>CVE-2013-0160</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/797175</URL>
        <Description>SUSE Bug 797175</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/841063</URL>
        <Description>SUSE Bug 841063</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871595</URL>
        <Description>SUSE Bug 871595</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux kernel 2.6.18 and 3.8 allows guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages. NOTE: some of these details are obtained from third party information.</Note>
    </Notes>
    <CVE>CVE-2013-0231</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-0231.html</URL>
        <Description>CVE-2013-0231</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/801178</URL>
        <Description>SUSE Bug 801178</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/841063</URL>
        <Description>SUSE Bug 841063</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871595</URL>
        <Description>SUSE Bug 871595</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel through 3.8.3, as used in Google Chrome OS before 25.0.1364.173 and other products, allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted application that triggers many relocation copies, and potentially leads to a race condition.</Note>
    </Notes>
    <CVE>CVE-2013-0913</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-0913.html</URL>
        <Description>CVE-2013-0913</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/808829</URL>
        <Description>SUSE Bug 808829</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871595</URL>
        <Description>SUSE Bug 871595</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the iscsi_add_notunderstood_response function in drivers/target/iscsi/iscsi_target_parameters.c in the iSCSI target subsystem in the Linux kernel through 3.9.4 allows remote attackers to cause a denial of service (memory corruption and OOPS) or possibly execute arbitrary code via a long key that is not properly handled during construction of an error-response packet.</Note>
    </Notes>
    <CVE>CVE-2013-2850</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2850.html</URL>
        <Description>CVE-2013-2850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/821560</URL>
        <Description>SUSE Bug 821560</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13.2, when CONFIG_X86_X32 is enabled, allows local users to gain privileges via a recvmmsg system call with a crafted timeout pointer parameter.</Note>
    </Notes>
    <CVE>CVE-2014-0038</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0038.html</URL>
        <Description>CVE-2014-0038</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/860993</URL>
        <Description>SUSE Bug 860993</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO &amp; !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.</Note>
    </Notes>
    <CVE>CVE-2014-0196</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0196.html</URL>
        <Description>CVE-2014-0196</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871252</URL>
        <Description>SUSE Bug 871252</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/875690</URL>
        <Description>SUSE Bug 875690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/877345</URL>
        <Description>SUSE Bug 877345</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/879878</URL>
        <Description>SUSE Bug 879878</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/933423</URL>
        <Description>SUSE Bug 933423</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Cisco WebEx Meetings Server before 1.1 uses meeting IDs with insufficient entropy, which makes it easier for remote attackers to bypass authentication and join arbitrary meetings without a password, aka Bug ID CSCuc79643.</Note>
    </Notes>
    <CVE>CVE-2014-0691</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0691.html</URL>
        <Description>CVE-2014-0691</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.</Note>
    </Notes>
    <CVE>CVE-2014-8133</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8133.html</URL>
        <Description>CVE-2014-8133</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/817142</URL>
        <Description>SUSE Bug 817142</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/906545</URL>
        <Description>SUSE Bug 906545</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/907818</URL>
        <Description>SUSE Bug 907818</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/909077</URL>
        <Description>SUSE Bug 909077</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the __key_link_end function in security/keys/keyring.c in the Linux kernel before 4.1.4 allows local users to cause a denial of service (memory consumption) via many add_key system calls that refer to existing keys.</Note>
    </Notes>
    <CVE>CVE-2015-1333</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1333.html</URL>
        <Description>CVE-2015-1333</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126909</URL>
        <Description>SUSE Bug 1126909</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185451</URL>
        <Description>SUSE Bug 1185451</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938645</URL>
        <Description>SUSE Bug 938645</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel before 4.3.4 does not properly use a semaphore, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls.</Note>
    </Notes>
    <CVE>CVE-2015-7550</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7550.html</URL>
        <Description>CVE-2015-7550</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020452</URL>
        <Description>SUSE Bug 1020452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052256</URL>
        <Description>SUSE Bug 1052256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958951</URL>
        <Description>SUSE Bug 958951</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The vivid_fb_ioctl function in drivers/media/platform/vivid/vivid-osd.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.</Note>
    </Notes>
    <CVE>CVE-2015-7884</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.7</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7884.html</URL>
        <Description>CVE-2015-7884</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126909</URL>
        <Description>SUSE Bug 1126909</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951626</URL>
        <Description>SUSE Bug 951626</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951627</URL>
        <Description>SUSE Bug 951627</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.</Note>
    </Notes>
    <CVE>CVE-2015-7885</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7885.html</URL>
        <Description>CVE-2015-7885</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126909</URL>
        <Description>SUSE Bug 1126909</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951626</URL>
        <Description>SUSE Bug 951626</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951627</URL>
        <Description>SUSE Bug 951627</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.</Note>
    </Notes>
    <CVE>CVE-2015-8539</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8539.html</URL>
        <Description>CVE-2015-8539</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/781018</URL>
        <Description>SUSE Bug 781018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958463</URL>
        <Description>SUSE Bug 958463</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958601</URL>
        <Description>SUSE Bug 958601</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3.3 attempts to merge distinct setattr operations, which allows local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application.</Note>
    </Notes>
    <CVE>CVE-2015-8660</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8660.html</URL>
        <Description>CVE-2015-8660</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923755</URL>
        <Description>SUSE Bug 923755</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960281</URL>
        <Description>SUSE Bug 960281</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960329</URL>
        <Description>SUSE Bug 960329</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963994</URL>
        <Description>SUSE Bug 963994</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call.</Note>
    </Notes>
    <CVE>CVE-2016-0723</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0723.html</URL>
        <Description>CVE-2016-0723</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020452</URL>
        <Description>SUSE Bug 1020452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961500</URL>
        <Description>SUSE Bug 961500</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.</Note>
    </Notes>
    <CVE>CVE-2016-0728</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0728.html</URL>
        <Description>CVE-2016-0728</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923755</URL>
        <Description>SUSE Bug 923755</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962075</URL>
        <Description>SUSE Bug 962075</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962078</URL>
        <Description>SUSE Bug 962078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963994</URL>
        <Description>SUSE Bug 963994</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">nfsd in the Linux kernel through 4.6.3 allows local users to bypass intended file-permission restrictions by setting a POSIX ACL, related to nfs2acl.c, nfs3acl.c, and nfs4acl.c.</Note>
    </Notes>
    <CVE>CVE-2016-1237</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.8</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1237.html</URL>
        <Description>CVE-2016-1237</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986570</URL>
        <Description>SUSE Bug 986570</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.</Note>
    </Notes>
    <CVE>CVE-2016-1583</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1583.html</URL>
        <Description>CVE-2016-1583</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020452</URL>
        <Description>SUSE Bug 1020452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052256</URL>
        <Description>SUSE Bug 1052256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983143</URL>
        <Description>SUSE Bug 983143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983144</URL>
        <Description>SUSE Bug 983144</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor.</Note>
    </Notes>
    <CVE>CVE-2016-2184</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2184.html</URL>
        <Description>CVE-2016-2184</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020452</URL>
        <Description>SUSE Bug 1020452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971125</URL>
        <Description>SUSE Bug 971125</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.</Note>
    </Notes>
    <CVE>CVE-2016-2185</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2185.html</URL>
        <Description>CVE-2016-2185</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020452</URL>
        <Description>SUSE Bug 1020452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971124</URL>
        <Description>SUSE Bug 971124</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.</Note>
    </Notes>
    <CVE>CVE-2016-2186</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2186.html</URL>
        <Description>CVE-2016-2186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020452</URL>
        <Description>SUSE Bug 1020452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/970958</URL>
        <Description>SUSE Bug 970958</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.</Note>
    </Notes>
    <CVE>CVE-2016-2384</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2384.html</URL>
        <Description>CVE-2016-2384</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020452</URL>
        <Description>SUSE Bug 1020452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/966693</URL>
        <Description>SUSE Bug 966693</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967773</URL>
        <Description>SUSE Bug 967773</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.</Note>
    </Notes>
    <CVE>CVE-2016-3134</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3134.html</URL>
        <Description>CVE-2016-3134</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020452</URL>
        <Description>SUSE Bug 1020452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052256</URL>
        <Description>SUSE Bug 1052256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971126</URL>
        <Description>SUSE Bug 971126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971793</URL>
        <Description>SUSE Bug 971793</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986362</URL>
        <Description>SUSE Bug 986362</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986365</URL>
        <Description>SUSE Bug 986365</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986377</URL>
        <Description>SUSE Bug 986377</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the xt_alloc_table_info function in net/netfilter/x_tables.c in the Linux kernel through 4.5.2 on 32-bit platforms allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.</Note>
    </Notes>
    <CVE>CVE-2016-3135</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3135.html</URL>
        <Description>CVE-2016-3135</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/970904</URL>
        <Description>SUSE Bug 970904</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971794</URL>
        <Description>SUSE Bug 971794</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors.</Note>
    </Notes>
    <CVE>CVE-2016-3136</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3136.html</URL>
        <Description>CVE-2016-3136</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/970955</URL>
        <Description>SUSE Bug 970955</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.</Note>
    </Notes>
    <CVE>CVE-2016-3140</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3140.html</URL>
        <Description>CVE-2016-3140</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020452</URL>
        <Description>SUSE Bug 1020452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/970892</URL>
        <Description>SUSE Bug 970892</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="58">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface.</Note>
    </Notes>
    <CVE>CVE-2016-3689</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3689.html</URL>
        <Description>CVE-2016-3689</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971628</URL>
        <Description>SUSE Bug 971628</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="59">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The msr_mtrr_valid function in arch/x86/kvm/mtrr.c in the Linux kernel before 4.6.1 supports MSR 0x2f8, which allows guest OS users to read or write to the kvm_arch_vcpu data structure, and consequently obtain sensitive information or cause a denial of service (system crash), via a crafted ioctl call.</Note>
    </Notes>
    <CVE>CVE-2016-3713</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3713.html</URL>
        <Description>CVE-2016-3713</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/979715</URL>
        <Description>SUSE Bug 979715</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/985132</URL>
        <Description>SUSE Bug 985132</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="60">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.</Note>
    </Notes>
    <CVE>CVE-2016-4470</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4470.html</URL>
        <Description>CVE-2016-4470</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020452</URL>
        <Description>SUSE Bug 1020452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984755</URL>
        <Description>SUSE Bug 984755</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984764</URL>
        <Description>SUSE Bug 984764</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991651</URL>
        <Description>SUSE Bug 991651</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="61">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.</Note>
    </Notes>
    <CVE>CVE-2016-4485</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4485.html</URL>
        <Description>CVE-2016-4485</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020452</URL>
        <Description>SUSE Bug 1020452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/978821</URL>
        <Description>SUSE Bug 978821</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="62">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.</Note>
    </Notes>
    <CVE>CVE-2016-4486</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4486.html</URL>
        <Description>CVE-2016-4486</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020452</URL>
        <Description>SUSE Bug 1020452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/978822</URL>
        <Description>SUSE Bug 978822</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="63">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The replace_map_fd_with_map_ptr function in kernel/bpf/verifier.c in the Linux kernel before 4.5.5 does not properly maintain an fd data structure, which allows local users to gain privileges or cause a denial of service (use-after-free) via crafted BPF instructions that reference an incorrect file descriptor.</Note>
    </Notes>
    <CVE>CVE-2016-4557</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4557.html</URL>
        <Description>CVE-2016-4557</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/979018</URL>
        <Description>SUSE Bug 979018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/979077</URL>
        <Description>SUSE Bug 979077</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="64">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BPF subsystem in the Linux kernel before 4.5.5 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted application on (1) a system with more than 32 Gb of memory, related to the program reference count or (2) a 1 Tb system, related to the map reference count.</Note>
    </Notes>
    <CVE>CVE-2016-4558</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4558.html</URL>
        <Description>CVE-2016-4558</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/979019</URL>
        <Description>SUSE Bug 979019</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="65">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.</Note>
    </Notes>
    <CVE>CVE-2016-4569</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4569.html</URL>
        <Description>CVE-2016-4569</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020452</URL>
        <Description>SUSE Bug 1020452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/979213</URL>
        <Description>SUSE Bug 979213</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/979879</URL>
        <Description>SUSE Bug 979879</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="66">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.</Note>
    </Notes>
    <CVE>CVE-2016-4578</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4578.html</URL>
        <Description>CVE-2016-4578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020452</URL>
        <Description>SUSE Bug 1020452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052256</URL>
        <Description>SUSE Bug 1052256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/979879</URL>
        <Description>SUSE Bug 979879</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="67">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.</Note>
    </Notes>
    <CVE>CVE-2016-4951</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4951.html</URL>
        <Description>CVE-2016-4951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981058</URL>
        <Description>SUSE Bug 981058</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/985132</URL>
        <Description>SUSE Bug 985132</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="68">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.</Note>
    </Notes>
    <CVE>CVE-2016-4997</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4997.html</URL>
        <Description>CVE-2016-4997</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020452</URL>
        <Description>SUSE Bug 1020452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986362</URL>
        <Description>SUSE Bug 986362</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986365</URL>
        <Description>SUSE Bug 986365</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986377</URL>
        <Description>SUSE Bug 986377</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991651</URL>
        <Description>SUSE Bug 991651</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="69">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.</Note>
    </Notes>
    <CVE>CVE-2016-4998</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4998.html</URL>
        <Description>CVE-2016-4998</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020452</URL>
        <Description>SUSE Bug 1020452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986362</URL>
        <Description>SUSE Bug 986362</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986365</URL>
        <Description>SUSE Bug 986365</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="70">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."</Note>
    </Notes>
    <CVE>CVE-2016-5195</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.6</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5195.html</URL>
        <Description>CVE-2016-5195</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004418</URL>
        <Description>SUSE Bug 1004418</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004419</URL>
        <Description>SUSE Bug 1004419</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004436</URL>
        <Description>SUSE Bug 1004436</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1006323</URL>
        <Description>SUSE Bug 1006323</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1006695</URL>
        <Description>SUSE Bug 1006695</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007291</URL>
        <Description>SUSE Bug 1007291</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008110</URL>
        <Description>SUSE Bug 1008110</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1030118</URL>
        <Description>SUSE Bug 1030118</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1046453</URL>
        <Description>SUSE Bug 1046453</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1069496</URL>
        <Description>SUSE Bug 1069496</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149725</URL>
        <Description>SUSE Bug 1149725</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/870618</URL>
        <Description>SUSE Bug 870618</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986445</URL>
        <Description>SUSE Bug 986445</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998689</URL>
        <Description>SUSE Bug 998689</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="71">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.</Note>
    </Notes>
    <CVE>CVE-2016-5244</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5244.html</URL>
        <Description>CVE-2016-5244</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983213</URL>
        <Description>SUSE Bug 983213</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986225</URL>
        <Description>SUSE Bug 986225</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="72">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.</Note>
    </Notes>
    <CVE>CVE-2016-5829</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5829.html</URL>
        <Description>CVE-2016-5829</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053919</URL>
        <Description>SUSE Bug 1053919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1054127</URL>
        <Description>SUSE Bug 1054127</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986572</URL>
        <Description>SUSE Bug 986572</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986573</URL>
        <Description>SUSE Bug 986573</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991651</URL>
        <Description>SUSE Bug 991651</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="73">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook.</Note>
    </Notes>
    <CVE>CVE-2016-6187</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6187.html</URL>
        <Description>CVE-2016-6187</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/988307</URL>
        <Description>SUSE Bug 988307</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="74">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability.</Note>
    </Notes>
    <CVE>CVE-2016-6480</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6480.html</URL>
        <Description>CVE-2016-6480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004418</URL>
        <Description>SUSE Bug 1004418</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991608</URL>
        <Description>SUSE Bug 991608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991667</URL>
        <Description>SUSE Bug 991667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/992568</URL>
        <Description>SUSE Bug 992568</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="75">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the ioctl_file_dedupe_range function in fs/ioctl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (heap-based buffer overflow) or possibly gain privileges by changing a certain count value, aka a "double fetch" vulnerability.</Note>
    </Notes>
    <CVE>CVE-2016-6516</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6516.html</URL>
        <Description>CVE-2016-6516</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991604</URL>
        <Description>SUSE Bug 991604</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991669</URL>
        <Description>SUSE Bug 991669</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="76">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.</Note>
    </Notes>
    <CVE>CVE-2016-6828</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6828.html</URL>
        <Description>CVE-2016-6828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052256</URL>
        <Description>SUSE Bug 1052256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/994296</URL>
        <Description>SUSE Bug 994296</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="77">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.</Note>
    </Notes>
    <CVE>CVE-2016-7039</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7039.html</URL>
        <Description>CVE-2016-7039</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001486</URL>
        <Description>SUSE Bug 1001486</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001487</URL>
        <Description>SUSE Bug 1001487</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003964</URL>
        <Description>SUSE Bug 1003964</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="78">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.</Note>
    </Notes>
    <CVE>CVE-2016-7042</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7042.html</URL>
        <Description>CVE-2016-7042</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004517</URL>
        <Description>SUSE Bug 1004517</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="79">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.</Note>
    </Notes>
    <CVE>CVE-2016-7425</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7425.html</URL>
        <Description>CVE-2016-7425</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999932</URL>
        <Description>SUSE Bug 999932</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="80">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure.</Note>
    </Notes>
    <CVE>CVE-2016-7913</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7913.html</URL>
        <Description>CVE-2016-7913</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010478</URL>
        <Description>SUSE Bug 1010478</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="81">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.</Note>
    </Notes>
    <CVE>CVE-2016-9555</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:C/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9555.html</URL>
        <Description>CVE-2016-9555</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011685</URL>
        <Description>SUSE Bug 1011685</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012183</URL>
        <Description>SUSE Bug 1012183</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="82">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device.</Note>
    </Notes>
    <CVE>CVE-2016-9576</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kernel-debug-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-macros-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syms-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9576.html</URL>
        <Description>CVE-2016-9576</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013604</URL>
        <Description>SUSE Bug 1013604</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014271</URL>
        <Description>SUSE Bug 1014271</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1017710</URL>
        <Description>SUSE Bug 1017710</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1019079</URL>
        <Description>SUSE Bug 1019079</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1019668</URL>
        <Description>SUSE Bug 1019668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
