<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:0458-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-02-13T16:19:58Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-02-13T16:19:58Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-02-13T16:19:58Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
The openSUSE Leap 42.1 kernel to 4.1.38 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).
- CVE-2017-5551: tmpfs: Fixed a bug that could have allowed users to set setgid bits on files they don't down (bsc#1021258).
- CVE-2016-10147: crypto/mcryptd.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) by using an AF_ALG socket with an incompatible algorithm, as demonstrated by mcryptd(md5) (bnc#1020381).
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2016-7917: The nfnetlink_rcv_batch function in net/netfilter/nfnetlink.c in the Linux kernel did not check whether a batch message's length field is large enough, which allowed local users to obtain sensitive information from kernel memory or cause a denial of service (infinite loop or out-of-bounds read) by leveraging the CAP_NET_ADMIN capability (bnc#1010444).
- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb truncation, which allowed local users to cause a denial of service (system crash) via a crafted application that made sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c (bnc#1009969).
- CVE-2016-9806: Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel allowed local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that made sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated (bnc#1013540 1017589).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531 1013542).

The following non-security bugs were fixed:

- PCI: generic: Fix pci_remap_iospace() failure path (bsc#1019658).
- bcache: partition support: add 16 minors per bcacheN device (bsc#1019784).
- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).
- clk: xgene: Do not call __pa on ioremaped address (bsc#1019660).
- kABI workaround for 4.1.37 mount changes (stable-4.1.37).
- kABI: reintroduce sk_filter (bsc#1009969).
- kabi/severities: Ignore inode_change_ok change It's renamed in 4.1.37 to setattr_prepare()
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).
- net: introduce __sock_queue_rcv_skb() function (bsc#1009969).
- netback: correct array index (bsc#983348).
- netfront: do not truncate grant references.
- netfront: use correct linear area after linearizing an skb (bsc#1007886).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rose: limit sk_filter trim to payload (bsc#1009969).
- scsi: bfa: Increase requested firmware version to 3.2.5.1 (bsc#1013273).
- xenbus: correctly signal errors from xenstored_local_init() (luckily none so far).
- xenbus: do not invoke -&gt;is_ready() for most device states (bsc#987333).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00022.html</URL>
      <Description>E-Mail link for openSUSE-SU-2017:0458-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-4.1.38-47.1">
      <FullProductName ProductID="kernel-debug-4.1.38-47.1">kernel-debug-4.1.38-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-base-4.1.38-47.1">
      <FullProductName ProductID="kernel-debug-base-4.1.38-47.1">kernel-debug-base-4.1.38-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-devel-4.1.38-47.1">
      <FullProductName ProductID="kernel-debug-devel-4.1.38-47.1">kernel-debug-devel-4.1.38-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-4.1.38-47.1">
      <FullProductName ProductID="kernel-default-4.1.38-47.1">kernel-default-4.1.38-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-4.1.38-47.1">
      <FullProductName ProductID="kernel-default-base-4.1.38-47.1">kernel-default-base-4.1.38-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-4.1.38-47.1">
      <FullProductName ProductID="kernel-default-devel-4.1.38-47.1">kernel-default-devel-4.1.38-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-4.1.38-47.1">
      <FullProductName ProductID="kernel-devel-4.1.38-47.1">kernel-devel-4.1.38-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-4.1.38-47.2">
      <FullProductName ProductID="kernel-docs-4.1.38-47.2">kernel-docs-4.1.38-47.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-html-4.1.38-47.2">
      <FullProductName ProductID="kernel-docs-html-4.1.38-47.2">kernel-docs-html-4.1.38-47.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-pdf-4.1.38-47.2">
      <FullProductName ProductID="kernel-docs-pdf-4.1.38-47.2">kernel-docs-pdf-4.1.38-47.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-4.1.38-47.1">
      <FullProductName ProductID="kernel-ec2-4.1.38-47.1">kernel-ec2-4.1.38-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-base-4.1.38-47.1">
      <FullProductName ProductID="kernel-ec2-base-4.1.38-47.1">kernel-ec2-base-4.1.38-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-devel-4.1.38-47.1">
      <FullProductName ProductID="kernel-ec2-devel-4.1.38-47.1">kernel-ec2-devel-4.1.38-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-macros-4.1.38-47.1">
      <FullProductName ProductID="kernel-macros-4.1.38-47.1">kernel-macros-4.1.38-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-build-4.1.38-47.3">
      <FullProductName ProductID="kernel-obs-build-4.1.38-47.3">kernel-obs-build-4.1.38-47.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-qa-4.1.38-47.1">
      <FullProductName ProductID="kernel-obs-qa-4.1.38-47.1">kernel-obs-qa-4.1.38-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-4.1.38-47.1">
      <FullProductName ProductID="kernel-pae-4.1.38-47.1">kernel-pae-4.1.38-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-base-4.1.38-47.1">
      <FullProductName ProductID="kernel-pae-base-4.1.38-47.1">kernel-pae-base-4.1.38-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-devel-4.1.38-47.1">
      <FullProductName ProductID="kernel-pae-devel-4.1.38-47.1">kernel-pae-devel-4.1.38-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pv-4.1.38-47.1">
      <FullProductName ProductID="kernel-pv-4.1.38-47.1">kernel-pv-4.1.38-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pv-base-4.1.38-47.1">
      <FullProductName ProductID="kernel-pv-base-4.1.38-47.1">kernel-pv-base-4.1.38-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pv-devel-4.1.38-47.1">
      <FullProductName ProductID="kernel-pv-devel-4.1.38-47.1">kernel-pv-devel-4.1.38-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-4.1.38-47.1">
      <FullProductName ProductID="kernel-source-4.1.38-47.1">kernel-source-4.1.38-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-vanilla-4.1.38-47.1">
      <FullProductName ProductID="kernel-source-vanilla-4.1.38-47.1">kernel-source-vanilla-4.1.38-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-4.1.38-47.1">
      <FullProductName ProductID="kernel-syms-4.1.38-47.1">kernel-syms-4.1.38-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-4.1.38-47.1">
      <FullProductName ProductID="kernel-vanilla-4.1.38-47.1">kernel-vanilla-4.1.38-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-devel-4.1.38-47.1">
      <FullProductName ProductID="kernel-vanilla-devel-4.1.38-47.1">kernel-vanilla-devel-4.1.38-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-4.1.38-47.1">
      <FullProductName ProductID="kernel-xen-4.1.38-47.1">kernel-xen-4.1.38-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-base-4.1.38-47.1">
      <FullProductName ProductID="kernel-xen-base-4.1.38-47.1">kernel-xen-base-4.1.38-47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-devel-4.1.38-47.1">
      <FullProductName ProductID="kernel-xen-devel-4.1.38-47.1">kernel-xen-devel-4.1.38-47.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-debug-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-debug-4.1.38-47.1">kernel-debug-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-debug-base-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-debug-base-4.1.38-47.1">kernel-debug-base-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-debug-devel-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-debug-devel-4.1.38-47.1">kernel-debug-devel-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-default-4.1.38-47.1">kernel-default-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-default-base-4.1.38-47.1">kernel-default-base-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-default-devel-4.1.38-47.1">kernel-default-devel-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-devel-4.1.38-47.1">kernel-devel-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-4.1.38-47.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-docs-4.1.38-47.2">kernel-docs-4.1.38-47.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-html-4.1.38-47.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-docs-html-4.1.38-47.2">kernel-docs-html-4.1.38-47.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-pdf-4.1.38-47.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-docs-pdf-4.1.38-47.2">kernel-docs-pdf-4.1.38-47.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-ec2-4.1.38-47.1">kernel-ec2-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-base-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-ec2-base-4.1.38-47.1">kernel-ec2-base-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-devel-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-ec2-devel-4.1.38-47.1">kernel-ec2-devel-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-macros-4.1.38-47.1">kernel-macros-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-build-4.1.38-47.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-obs-build-4.1.38-47.3">kernel-obs-build-4.1.38-47.3 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-qa-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-obs-qa-4.1.38-47.1">kernel-obs-qa-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pae-4.1.38-47.1">kernel-pae-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-base-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pae-base-4.1.38-47.1">kernel-pae-base-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-devel-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pae-devel-4.1.38-47.1">kernel-pae-devel-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pv-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pv-4.1.38-47.1">kernel-pv-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pv-base-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pv-base-4.1.38-47.1">kernel-pv-base-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pv-devel-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pv-devel-4.1.38-47.1">kernel-pv-devel-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-source-4.1.38-47.1">kernel-source-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-vanilla-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-source-vanilla-4.1.38-47.1">kernel-source-vanilla-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-syms-4.1.38-47.1">kernel-syms-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-vanilla-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-vanilla-4.1.38-47.1">kernel-vanilla-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-vanilla-devel-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-vanilla-devel-4.1.38-47.1">kernel-vanilla-devel-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-xen-4.1.38-47.1">kernel-xen-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-base-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-xen-base-4.1.38-47.1">kernel-xen-base-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-devel-4.1.38-47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-xen-devel-4.1.38-47.1">kernel-xen-devel-4.1.38-47.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.</Note>
    </Notes>
    <CVE>CVE-2016-10088</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.38-47.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.38-47.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.38-47.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.38-47.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.38-47.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00022.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10088.html</URL>
        <Description>CVE-2016-10088</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013604</URL>
        <Description>SUSE Bug 1013604</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014271</URL>
        <Description>SUSE Bug 1014271</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1017710</URL>
        <Description>SUSE Bug 1017710</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1019079</URL>
        <Description>SUSE Bug 1019079</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">crypto/mcryptd.c in the Linux kernel before 4.8.15 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an AF_ALG socket with an incompatible algorithm, as demonstrated by mcryptd(md5).</Note>
    </Notes>
    <CVE>CVE-2016-10147</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.38-47.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.38-47.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.38-47.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.38-47.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.38-47.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00022.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10147.html</URL>
        <Description>CVE-2016-10147</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020381</URL>
        <Description>SUSE Bug 1020381</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020429</URL>
        <Description>SUSE Bug 1020429</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.</Note>
    </Notes>
    <CVE>CVE-2016-7117</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.38-47.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.38-47.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.38-47.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.38-47.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.38-47.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00022.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7117.html</URL>
        <Description>CVE-2016-7117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003077</URL>
        <Description>SUSE Bug 1003077</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003253</URL>
        <Description>SUSE Bug 1003253</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057478</URL>
        <Description>SUSE Bug 1057478</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The nfnetlink_rcv_batch function in net/netfilter/nfnetlink.c in the Linux kernel before 4.5 does not check whether a batch message's length field is large enough, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (infinite loop or out-of-bounds read) by leveraging the CAP_NET_ADMIN capability.</Note>
    </Notes>
    <CVE>CVE-2016-7917</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.38-47.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.38-47.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.38-47.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.38-47.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.38-47.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00022.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7917.html</URL>
        <Description>CVE-2016-7917</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010444</URL>
        <Description>SUSE Bug 1010444</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1025354</URL>
        <Description>SUSE Bug 1025354</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TCP stack in the Linux kernel before 4.8.10 mishandles skb truncation, which allows local users to cause a denial of service (system crash) via a crafted application that makes sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c.</Note>
    </Notes>
    <CVE>CVE-2016-8645</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.38-47.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.38-47.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.38-47.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.38-47.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.38-47.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00022.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8645.html</URL>
        <Description>CVE-2016-8645</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009969</URL>
        <Description>SUSE Bug 1009969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1025354</URL>
        <Description>SUSE Bug 1025354</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.</Note>
    </Notes>
    <CVE>CVE-2016-9793</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.38-47.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.38-47.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.38-47.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.38-47.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.38-47.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.9</BaseScore>
        <Vector>AV:L/AC:H/Au:M/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00022.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9793.html</URL>
        <Description>CVE-2016-9793</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013531</URL>
        <Description>SUSE Bug 1013531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013542</URL>
        <Description>SUSE Bug 1013542</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1025354</URL>
        <Description>SUSE Bug 1025354</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel before 4.6.3 allows local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that makes sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated.</Note>
    </Notes>
    <CVE>CVE-2016-9806</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.38-47.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.38-47.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.38-47.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.38-47.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.38-47.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00022.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9806.html</URL>
        <Description>CVE-2016-9806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013540</URL>
        <Description>SUSE Bug 1013540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1017589</URL>
        <Description>SUSE Bug 1017589</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.</Note>
    </Notes>
    <CVE>CVE-2017-5551</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.38-47.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.38-47.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.38-47.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.38-47.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.38-47.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.38-47.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00022.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5551.html</URL>
        <Description>CVE-2017-5551</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021258</URL>
        <Description>SUSE Bug 1021258</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/995968</URL>
        <Description>SUSE Bug 995968</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
