<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:1641-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-06-21T09:01:13Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-06-21T09:01:13Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-06-21T09:01:13Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
The openSUSE Leap 42.1 kernel was updated to 4.1.26 to receive various security and bugfixes.

The following security bugs were fixed:
- CVE-2016-1583: Prevent the usage of mmap when the lower file system
  does not allow it. This could have lead to local privilege escalation
  when ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was
  setuid (bsc#983143).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel
  incorrectly relies on the write system call, which allows local users
  to cause a denial of service (kernel memory write operation) or possibly
  have unspecified other impact via a uAPI interface. (bsc#979548)
- CVE-2016-4805: Use-after-free vulnerability in
  drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users
  to cause a denial of service (memory corruption and system crash,
  or spinlock) or possibly have unspecified other impact by removing
  a network namespace, related to the ppp_register_net_channel and
  ppp_unregister_channel functions.  (bsc#980371).
- CVE-2016-4951: The tipc_nl_publ_dump function in net/tipc/socket.c
  in the Linux kernel did not verify socket existence, which allowed
  local users to cause a denial of service (NULL pointer dereference and
  system crash) or possibly have unspecified other impact via a dumpit
  operation. (bsc#981058).
- CVE-2016-5244: An information leak vulnerability in function
  rds_inc_info_copy of file net/rds/recv.c was fixed that might have leaked
  kernel stack data. (bsc#983213).
- CVE-2016-4580: The x25_negotiate_facilities function in
  net/x25/x25_facilities.c in the Linux kernel did not properly
  initialize a certain data structure, which allowed attackers to
  obtain sensitive information from kernel stack memory via an X.25 Call
  Request. (bsc#981267).
- CVE-2016-0758: Tags with indefinite length could have corrupted pointers
  in asn1_find_indefinite_length (bsc#979867).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c
  in the Linux kernel allowed attackers to cause a denial of service
  (panic) via an ASN.1 BER file that lacks a public key, leading
  to mishandling by the public_key_verify_signature function in
  crypto/asymmetric_keys/public_key.c (bnc#963762).
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in
  the Linux kernel allowed local users to bypass intended AF_UNIX socket
  permissions or cause a denial of service (panic) via crafted epoll_ctl
  calls (bnc#955654).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did
  not validate certain offset fields, which allowed local users to gain
  privileges or cause a denial of service (heap memory corruption) via an
  IPT_SO_SET_REPLACE setsockopt call (bnc#971126).
- CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c
  in the Linux kernel did not properly randomize the legacy base address,
  which made it easier for local users to defeat the intended restrictions
  on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism
  for a setuid or setgid program, by disabling stack-consumption resource
  limits (bnc#974308).
- CVE-2016-4482: A kernel information leak in the usbfs devio
  connectinfo was fixed, which could expose kernel stack memory to
  userspace. (bnc#978401).
- CVE-2016-4485: A kernel information leak in llc was fixed (bsc#978821).
- CVE-2016-4486: A kernel information leak in rtnetlink was fixed,
  where 4 uninitialized bytes could leak to userspace (bsc#978822).
- CVE-2016-4557: A use-after-free via double-fdput in
  replace_map_fd_with_map_ptr() was fixed, which could allow privilege
  escalation (bsc#979018).
- CVE-2016-4565: When the 'rdma_ucm' infiniband module is loaded, local
  attackers could escalate their privileges (bsc#979548).
- CVE-2016-4569: A kernel information leak in the ALSA timer via events
  via snd_timer_user_tinterrupt that could leak information to userspace
  was fixed (bsc#979213).
- CVE-2016-4578: A kernel information leak in the ALSA timer via events
  that could leak information to userspace was fixed (bsc#979879).
- CVE-2016-4581: If the first propogated mount copy was being a slave
  it could oops the kernel (bsc#979913)

The following non-security bugs were fixed:
- ALSA: hda - Add dock support for ThinkPad X260 (boo#979278).
- ALSA: hda - Apply fix for white noise on Asus N550JV, too (boo#979278).
- ALSA: hda - Asus N750JV external subwoofer fixup (boo#979278).
- ALSA: hda - Fix broken reconfig (boo#979278).
- ALSA: hda - Fix headphone mic input on a few Dell ALC293 machines (boo#979278).
- ALSA: hda - Fix subwoofer pin on ASUS N751 and N551 (boo#979278).
- ALSA: hda - Fix white noise on Asus N750JV headphone (boo#979278).
- ALSA: hda - Fix white noise on Asus UX501VW headset (boo#979278).
- ALSA: hda/realtek - Add ALC3234 headset mode for Optiplex 9020m (boo#979278).
- ALSA: hda/realtek - New codecs support for ALC234/ALC274/ALC294 (boo#979278).
- ALSA: hda/realtek - New codec support of ALC225 (boo#979278).
- ALSA: hda/realtek - Support headset mode for ALC225 (boo#979278).
- ALSA: pcxhr: Fix missing mutex unlock (boo#979278).
- ALSA: usb-audio: Quirk for yet another Phoenix Audio devices (v2) (boo#979278).
- bluetooth: fix power_on vs close race (bsc#966849).
- bluetooth: vhci: fix open_timeout vs. hdev race (bsc#971799,bsc#966849).
- bluetooth: vhci: Fix race at creating hci device (bsc#971799,bsc#966849).
- bluetooth: vhci: purge unhandled skbs (bsc#971799,bsc#966849).
- btrfs: do not use src fd for printk (bsc#980348).
- btrfs: fix crash/invalid memory access on fsync when using overlayfs (bsc#977198)
- drm: qxl: Workaround for buggy user-space (bsc#981344).
- enic: set netdev-&gt;vlan_features (bsc#966245).
- fs: add file_dentry() (bsc#977198).
- IB/IPoIB: Do not set skb truesize since using one linearskb (bsc#980657).
- input: i8042 - lower log level for 'no controller' message (bsc#945345).
- kabi: Add kabi/severities entries to ignore sound/hda/*, x509_*, efivar_validate, file_open_root and dax_fault
- kabi: Add some fixups (module, pci_dev, drm, fuse and thermal)
- kabi: file_dentry changes (bsc#977198).
- kABI fixes for 4.1.22
- mm/page_alloc.c: calculate 'available' memory in a separate function (bsc#982239).
- net: disable fragment reassembly if high_thresh is zero (bsc#970506).
- of: iommu: Silence misleading warning.
- pstore_register() error handling was wrong -- it tried to release lock before it's acquired, causing spinlock / preemption imbalance.  - usb: quirk to stop runtime PM for Intel 7260 (bnc#984460).
- Revert 'usb: hub: do not clear BOS field during reset device' (boo#979728).
- usb: core: hub: hub_port_init lock controller instead of bus (bnc#978073).
- usb: preserve kABI in address0 locking (bnc#978073).
- usb: usbip: fix potential out-of-bounds write (bnc#975945).
- USB: xhci: Add broken streams quirk for Frescologic device id 1009  (bnc#982712).
- virtio_balloon: do not change memory amount visible via /proc/meminfo (bsc#982238).
- virtio_balloon: export 'available' memory to balloon statistics (bsc#982239).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:1641-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-4.1.26-21.1">
      <FullProductName ProductID="kernel-debug-4.1.26-21.1">kernel-debug-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-base-4.1.26-21.1">
      <FullProductName ProductID="kernel-debug-base-4.1.26-21.1">kernel-debug-base-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-devel-4.1.26-21.1">
      <FullProductName ProductID="kernel-debug-devel-4.1.26-21.1">kernel-debug-devel-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-4.1.26-21.1">
      <FullProductName ProductID="kernel-default-4.1.26-21.1">kernel-default-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-4.1.26-21.1">
      <FullProductName ProductID="kernel-default-base-4.1.26-21.1">kernel-default-base-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-4.1.26-21.1">
      <FullProductName ProductID="kernel-default-devel-4.1.26-21.1">kernel-default-devel-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-4.1.26-21.1">
      <FullProductName ProductID="kernel-devel-4.1.26-21.1">kernel-devel-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-4.1.26-21.2">
      <FullProductName ProductID="kernel-docs-4.1.26-21.2">kernel-docs-4.1.26-21.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-html-4.1.26-21.2">
      <FullProductName ProductID="kernel-docs-html-4.1.26-21.2">kernel-docs-html-4.1.26-21.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-pdf-4.1.26-21.2">
      <FullProductName ProductID="kernel-docs-pdf-4.1.26-21.2">kernel-docs-pdf-4.1.26-21.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-4.1.26-21.1">
      <FullProductName ProductID="kernel-ec2-4.1.26-21.1">kernel-ec2-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-base-4.1.26-21.1">
      <FullProductName ProductID="kernel-ec2-base-4.1.26-21.1">kernel-ec2-base-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-devel-4.1.26-21.1">
      <FullProductName ProductID="kernel-ec2-devel-4.1.26-21.1">kernel-ec2-devel-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-macros-4.1.26-21.1">
      <FullProductName ProductID="kernel-macros-4.1.26-21.1">kernel-macros-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-build-4.1.26-21.1">
      <FullProductName ProductID="kernel-obs-build-4.1.26-21.1">kernel-obs-build-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-qa-4.1.26-21.1">
      <FullProductName ProductID="kernel-obs-qa-4.1.26-21.1">kernel-obs-qa-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-qa-xen-4.1.26-21.1">
      <FullProductName ProductID="kernel-obs-qa-xen-4.1.26-21.1">kernel-obs-qa-xen-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-4.1.26-21.1">
      <FullProductName ProductID="kernel-pae-4.1.26-21.1">kernel-pae-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-base-4.1.26-21.1">
      <FullProductName ProductID="kernel-pae-base-4.1.26-21.1">kernel-pae-base-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-devel-4.1.26-21.1">
      <FullProductName ProductID="kernel-pae-devel-4.1.26-21.1">kernel-pae-devel-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pv-4.1.26-21.1">
      <FullProductName ProductID="kernel-pv-4.1.26-21.1">kernel-pv-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pv-base-4.1.26-21.1">
      <FullProductName ProductID="kernel-pv-base-4.1.26-21.1">kernel-pv-base-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pv-devel-4.1.26-21.1">
      <FullProductName ProductID="kernel-pv-devel-4.1.26-21.1">kernel-pv-devel-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-4.1.26-21.1">
      <FullProductName ProductID="kernel-source-4.1.26-21.1">kernel-source-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-vanilla-4.1.26-21.1">
      <FullProductName ProductID="kernel-source-vanilla-4.1.26-21.1">kernel-source-vanilla-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-4.1.26-21.1">
      <FullProductName ProductID="kernel-syms-4.1.26-21.1">kernel-syms-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-4.1.26-21.1">
      <FullProductName ProductID="kernel-vanilla-4.1.26-21.1">kernel-vanilla-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-devel-4.1.26-21.1">
      <FullProductName ProductID="kernel-vanilla-devel-4.1.26-21.1">kernel-vanilla-devel-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-4.1.26-21.1">
      <FullProductName ProductID="kernel-xen-4.1.26-21.1">kernel-xen-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-base-4.1.26-21.1">
      <FullProductName ProductID="kernel-xen-base-4.1.26-21.1">kernel-xen-base-4.1.26-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-devel-4.1.26-21.1">
      <FullProductName ProductID="kernel-xen-devel-4.1.26-21.1">kernel-xen-devel-4.1.26-21.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-debug-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-debug-4.1.26-21.1">kernel-debug-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-debug-base-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-debug-base-4.1.26-21.1">kernel-debug-base-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-debug-devel-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-debug-devel-4.1.26-21.1">kernel-debug-devel-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-default-4.1.26-21.1">kernel-default-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-default-base-4.1.26-21.1">kernel-default-base-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-default-devel-4.1.26-21.1">kernel-default-devel-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-devel-4.1.26-21.1">kernel-devel-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-4.1.26-21.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-docs-4.1.26-21.2">kernel-docs-4.1.26-21.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-html-4.1.26-21.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-docs-html-4.1.26-21.2">kernel-docs-html-4.1.26-21.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-pdf-4.1.26-21.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-docs-pdf-4.1.26-21.2">kernel-docs-pdf-4.1.26-21.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-ec2-4.1.26-21.1">kernel-ec2-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-base-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-ec2-base-4.1.26-21.1">kernel-ec2-base-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-devel-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-ec2-devel-4.1.26-21.1">kernel-ec2-devel-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-macros-4.1.26-21.1">kernel-macros-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-build-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-obs-build-4.1.26-21.1">kernel-obs-build-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-qa-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-obs-qa-4.1.26-21.1">kernel-obs-qa-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-qa-xen-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.26-21.1">kernel-obs-qa-xen-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pae-4.1.26-21.1">kernel-pae-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-base-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pae-base-4.1.26-21.1">kernel-pae-base-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-devel-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pae-devel-4.1.26-21.1">kernel-pae-devel-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pv-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pv-4.1.26-21.1">kernel-pv-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pv-base-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pv-base-4.1.26-21.1">kernel-pv-base-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pv-devel-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pv-devel-4.1.26-21.1">kernel-pv-devel-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-source-4.1.26-21.1">kernel-source-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-vanilla-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-source-vanilla-4.1.26-21.1">kernel-source-vanilla-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-syms-4.1.26-21.1">kernel-syms-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-vanilla-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-vanilla-4.1.26-21.1">kernel-vanilla-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-vanilla-devel-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-vanilla-devel-4.1.26-21.1">kernel-vanilla-devel-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-xen-4.1.26-21.1">kernel-xen-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-base-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-xen-base-4.1.26-21.1">kernel-xen-base-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-devel-4.1.26-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-xen-devel-4.1.26-21.1">kernel-xen-devel-4.1.26-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.</Note>
    </Notes>
    <CVE>CVE-2013-7446</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.26-21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-7446.html</URL>
        <Description>CVE-2013-7446</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/955654</URL>
        <Description>SUSE Bug 955654</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/955837</URL>
        <Description>SUSE Bug 955837</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.</Note>
    </Notes>
    <CVE>CVE-2016-0758</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.26-21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0758.html</URL>
        <Description>CVE-2016-0758</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/979867</URL>
        <Description>SUSE Bug 979867</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980856</URL>
        <Description>SUSE Bug 980856</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.</Note>
    </Notes>
    <CVE>CVE-2016-1583</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.26-21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1583.html</URL>
        <Description>CVE-2016-1583</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052256</URL>
        <Description>SUSE Bug 1052256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983143</URL>
        <Description>SUSE Bug 983143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983144</URL>
        <Description>SUSE Bug 983144</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990058</URL>
        <Description>SUSE Bug 990058</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.</Note>
    </Notes>
    <CVE>CVE-2016-2053</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.26-21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2053.html</URL>
        <Description>CVE-2016-2053</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963762</URL>
        <Description>SUSE Bug 963762</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/979074</URL>
        <Description>SUSE Bug 979074</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990058</URL>
        <Description>SUSE Bug 990058</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.</Note>
    </Notes>
    <CVE>CVE-2016-3134</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.26-21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3134.html</URL>
        <Description>CVE-2016-3134</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052256</URL>
        <Description>SUSE Bug 1052256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971126</URL>
        <Description>SUSE Bug 971126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971793</URL>
        <Description>SUSE Bug 971793</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986362</URL>
        <Description>SUSE Bug 986362</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986365</URL>
        <Description>SUSE Bug 986365</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.</Note>
    </Notes>
    <CVE>CVE-2016-3672</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.26-21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3672.html</URL>
        <Description>CVE-2016-3672</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/974308</URL>
        <Description>SUSE Bug 974308</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990058</URL>
        <Description>SUSE Bug 990058</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c in the Linux kernel before 4.5.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted length value in a USB/IP packet.</Note>
    </Notes>
    <CVE>CVE-2016-3955</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.26-21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3955.html</URL>
        <Description>CVE-2016-3955</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/975945</URL>
        <Description>SUSE Bug 975945</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.</Note>
    </Notes>
    <CVE>CVE-2016-4482</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.26-21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4482.html</URL>
        <Description>CVE-2016-4482</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/978401</URL>
        <Description>SUSE Bug 978401</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/978445</URL>
        <Description>SUSE Bug 978445</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.</Note>
    </Notes>
    <CVE>CVE-2016-4485</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.26-21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4485.html</URL>
        <Description>CVE-2016-4485</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/978821</URL>
        <Description>SUSE Bug 978821</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.</Note>
    </Notes>
    <CVE>CVE-2016-4486</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.26-21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4486.html</URL>
        <Description>CVE-2016-4486</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/978822</URL>
        <Description>SUSE Bug 978822</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990058</URL>
        <Description>SUSE Bug 990058</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The replace_map_fd_with_map_ptr function in kernel/bpf/verifier.c in the Linux kernel before 4.5.5 does not properly maintain an fd data structure, which allows local users to gain privileges or cause a denial of service (use-after-free) via crafted BPF instructions that reference an incorrect file descriptor.</Note>
    </Notes>
    <CVE>CVE-2016-4557</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.26-21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4557.html</URL>
        <Description>CVE-2016-4557</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/979018</URL>
        <Description>SUSE Bug 979018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/979077</URL>
        <Description>SUSE Bug 979077</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.</Note>
    </Notes>
    <CVE>CVE-2016-4565</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.26-21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.6</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4565.html</URL>
        <Description>CVE-2016-4565</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/979548</URL>
        <Description>SUSE Bug 979548</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980363</URL>
        <Description>SUSE Bug 980363</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980883</URL>
        <Description>SUSE Bug 980883</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990058</URL>
        <Description>SUSE Bug 990058</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.</Note>
    </Notes>
    <CVE>CVE-2016-4569</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.26-21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4569.html</URL>
        <Description>CVE-2016-4569</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/979213</URL>
        <Description>SUSE Bug 979213</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/979879</URL>
        <Description>SUSE Bug 979879</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990058</URL>
        <Description>SUSE Bug 990058</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.</Note>
    </Notes>
    <CVE>CVE-2016-4578</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.26-21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4578.html</URL>
        <Description>CVE-2016-4578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052256</URL>
        <Description>SUSE Bug 1052256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/979879</URL>
        <Description>SUSE Bug 979879</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990058</URL>
        <Description>SUSE Bug 990058</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel before 4.5.5 does not properly initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request.</Note>
    </Notes>
    <CVE>CVE-2016-4580</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.26-21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4580.html</URL>
        <Description>CVE-2016-4580</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/870618</URL>
        <Description>SUSE Bug 870618</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981267</URL>
        <Description>SUSE Bug 981267</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/985132</URL>
        <Description>SUSE Bug 985132</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">fs/pnode.c in the Linux kernel before 4.5.4 does not properly traverse a mount propagation tree in a certain case involving a slave mount, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted series of mount system calls.</Note>
    </Notes>
    <CVE>CVE-2016-4581</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.26-21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4581.html</URL>
        <Description>CVE-2016-4581</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/979913</URL>
        <Description>SUSE Bug 979913</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.</Note>
    </Notes>
    <CVE>CVE-2016-4805</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.26-21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4805.html</URL>
        <Description>CVE-2016-4805</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980371</URL>
        <Description>SUSE Bug 980371</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990058</URL>
        <Description>SUSE Bug 990058</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.</Note>
    </Notes>
    <CVE>CVE-2016-4951</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.26-21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4951.html</URL>
        <Description>CVE-2016-4951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981058</URL>
        <Description>SUSE Bug 981058</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/985132</URL>
        <Description>SUSE Bug 985132</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.</Note>
    </Notes>
    <CVE>CVE-2016-5244</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.26-21.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.26-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.26-21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5244.html</URL>
        <Description>CVE-2016-5244</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983213</URL>
        <Description>SUSE Bug 983213</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990058</URL>
        <Description>SUSE Bug 990058</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
