<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:1215-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-05-08T13:43:41Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-05-08T13:43:41Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-05-08T13:43:41Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">

The openSUSE Leap 42.1 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2017-7618: crypto/ahash.c in the Linux kernel allowed attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue (bnc#1033340).
- CVE-2016-10318: A missing authorization check in the fscrypt_process_policy function in fs/crypto/policy.c in the ext4 and f2fs filesystem encryption support in the Linux kernel allowed a user to assign an encryption policy to a directory owned by a different user, potentially creating a denial of service (bnc#1032435).
- CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation (bnc#1033336).
- CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bnc#1031579).
- CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003).
- CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440).
- CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052).
- CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213).

The following non-security bugs were fixed:

- ata: ahci_xgene: free structure returned by acpi_get_object_info() (bsc#1033518).
- doc/README.SUSE: update links to KMP manual
- ext4: do not perform data journaling when data is encrypted (bsc#1012876).
- ext4: fix use-after-iput when fscrypt contexts are inconsistent (bsc#1012829).
- ext4: mark inode dirty after converting inline directory (bsc#1012876).
- ext4: reject inodes with negative size (bsc#1012876).
- fs, seqfile: always allow oom killer (bsc#1012876).
- ipv6: make ECMP route replacement less greedy (bsc#930399).
- l2tp: hold tunnel socket when handling control frames in l2tp_ip and l2tp_ip6 (bsc#1028415).
- mm: filemap: do not plant shadow entries without radix tree node (bsc#1012876).
- netfilter: allow logging from non-init namespaces (bsc#970083).
- nfsd4: minor NFSv2/v3 write decoding cleanup (bsc#1034670 CVE#2017-7645).
- nfsd: check for oversized NFSv2/v3 arguments (bsc#1034670 CVE#2017-7645).
- nfsd: stricter decoding of write-like NFSv2/v3 ops (bsc#1034670 CVE#2017-7645).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00016.html</URL>
      <Description>E-Mail link for openSUSE-SU-2017:1215-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-4.1.39-56.1">
      <FullProductName ProductID="kernel-debug-4.1.39-56.1">kernel-debug-4.1.39-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-base-4.1.39-56.1">
      <FullProductName ProductID="kernel-debug-base-4.1.39-56.1">kernel-debug-base-4.1.39-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-devel-4.1.39-56.1">
      <FullProductName ProductID="kernel-debug-devel-4.1.39-56.1">kernel-debug-devel-4.1.39-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-4.1.39-56.1">
      <FullProductName ProductID="kernel-default-4.1.39-56.1">kernel-default-4.1.39-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-4.1.39-56.1">
      <FullProductName ProductID="kernel-default-base-4.1.39-56.1">kernel-default-base-4.1.39-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-4.1.39-56.1">
      <FullProductName ProductID="kernel-default-devel-4.1.39-56.1">kernel-default-devel-4.1.39-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-4.1.39-56.1">
      <FullProductName ProductID="kernel-devel-4.1.39-56.1">kernel-devel-4.1.39-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-4.1.39-56.2">
      <FullProductName ProductID="kernel-docs-4.1.39-56.2">kernel-docs-4.1.39-56.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-html-4.1.39-56.2">
      <FullProductName ProductID="kernel-docs-html-4.1.39-56.2">kernel-docs-html-4.1.39-56.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-pdf-4.1.39-56.2">
      <FullProductName ProductID="kernel-docs-pdf-4.1.39-56.2">kernel-docs-pdf-4.1.39-56.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-4.1.39-56.1">
      <FullProductName ProductID="kernel-ec2-4.1.39-56.1">kernel-ec2-4.1.39-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-base-4.1.39-56.1">
      <FullProductName ProductID="kernel-ec2-base-4.1.39-56.1">kernel-ec2-base-4.1.39-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-devel-4.1.39-56.1">
      <FullProductName ProductID="kernel-ec2-devel-4.1.39-56.1">kernel-ec2-devel-4.1.39-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-macros-4.1.39-56.1">
      <FullProductName ProductID="kernel-macros-4.1.39-56.1">kernel-macros-4.1.39-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-build-4.1.39-56.3">
      <FullProductName ProductID="kernel-obs-build-4.1.39-56.3">kernel-obs-build-4.1.39-56.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-qa-4.1.39-56.1">
      <FullProductName ProductID="kernel-obs-qa-4.1.39-56.1">kernel-obs-qa-4.1.39-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-4.1.39-56.1">
      <FullProductName ProductID="kernel-pae-4.1.39-56.1">kernel-pae-4.1.39-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-base-4.1.39-56.1">
      <FullProductName ProductID="kernel-pae-base-4.1.39-56.1">kernel-pae-base-4.1.39-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-devel-4.1.39-56.1">
      <FullProductName ProductID="kernel-pae-devel-4.1.39-56.1">kernel-pae-devel-4.1.39-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pv-4.1.39-56.1">
      <FullProductName ProductID="kernel-pv-4.1.39-56.1">kernel-pv-4.1.39-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pv-base-4.1.39-56.1">
      <FullProductName ProductID="kernel-pv-base-4.1.39-56.1">kernel-pv-base-4.1.39-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pv-devel-4.1.39-56.1">
      <FullProductName ProductID="kernel-pv-devel-4.1.39-56.1">kernel-pv-devel-4.1.39-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-4.1.39-56.1">
      <FullProductName ProductID="kernel-source-4.1.39-56.1">kernel-source-4.1.39-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-vanilla-4.1.39-56.1">
      <FullProductName ProductID="kernel-source-vanilla-4.1.39-56.1">kernel-source-vanilla-4.1.39-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-4.1.39-56.1">
      <FullProductName ProductID="kernel-syms-4.1.39-56.1">kernel-syms-4.1.39-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-4.1.39-56.1">
      <FullProductName ProductID="kernel-vanilla-4.1.39-56.1">kernel-vanilla-4.1.39-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-devel-4.1.39-56.1">
      <FullProductName ProductID="kernel-vanilla-devel-4.1.39-56.1">kernel-vanilla-devel-4.1.39-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-4.1.39-56.1">
      <FullProductName ProductID="kernel-xen-4.1.39-56.1">kernel-xen-4.1.39-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-base-4.1.39-56.1">
      <FullProductName ProductID="kernel-xen-base-4.1.39-56.1">kernel-xen-base-4.1.39-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-devel-4.1.39-56.1">
      <FullProductName ProductID="kernel-xen-devel-4.1.39-56.1">kernel-xen-devel-4.1.39-56.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-debug-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-debug-4.1.39-56.1">kernel-debug-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-debug-base-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-debug-base-4.1.39-56.1">kernel-debug-base-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-debug-devel-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-debug-devel-4.1.39-56.1">kernel-debug-devel-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-default-4.1.39-56.1">kernel-default-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-default-base-4.1.39-56.1">kernel-default-base-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-default-devel-4.1.39-56.1">kernel-default-devel-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-devel-4.1.39-56.1">kernel-devel-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-4.1.39-56.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-docs-4.1.39-56.2">kernel-docs-4.1.39-56.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-html-4.1.39-56.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-docs-html-4.1.39-56.2">kernel-docs-html-4.1.39-56.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-pdf-4.1.39-56.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-docs-pdf-4.1.39-56.2">kernel-docs-pdf-4.1.39-56.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-ec2-4.1.39-56.1">kernel-ec2-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-base-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-ec2-base-4.1.39-56.1">kernel-ec2-base-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-devel-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-ec2-devel-4.1.39-56.1">kernel-ec2-devel-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-macros-4.1.39-56.1">kernel-macros-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-build-4.1.39-56.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-obs-build-4.1.39-56.3">kernel-obs-build-4.1.39-56.3 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-qa-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-obs-qa-4.1.39-56.1">kernel-obs-qa-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pae-4.1.39-56.1">kernel-pae-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-base-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pae-base-4.1.39-56.1">kernel-pae-base-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-devel-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pae-devel-4.1.39-56.1">kernel-pae-devel-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pv-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pv-4.1.39-56.1">kernel-pv-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pv-base-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pv-base-4.1.39-56.1">kernel-pv-base-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pv-devel-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-pv-devel-4.1.39-56.1">kernel-pv-devel-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-source-4.1.39-56.1">kernel-source-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-vanilla-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-source-vanilla-4.1.39-56.1">kernel-source-vanilla-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-syms-4.1.39-56.1">kernel-syms-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-vanilla-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-vanilla-4.1.39-56.1">kernel-vanilla-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-vanilla-devel-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-vanilla-devel-4.1.39-56.1">kernel-vanilla-devel-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-xen-4.1.39-56.1">kernel-xen-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-base-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-xen-base-4.1.39-56.1">kernel-xen-base-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-devel-4.1.39-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:kernel-xen-devel-4.1.39-56.1">kernel-xen-devel-4.1.39-56.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A missing authorization check in the fscrypt_process_policy function in fs/crypto/policy.c in the ext4 and f2fs filesystem encryption support in the Linux kernel before 4.7.4 allows a user to assign an encryption policy to a directory owned by a different user, potentially creating a denial of service.</Note>
    </Notes>
    <CVE>CVE-2016-10318</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.39-56.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.39-56.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.39-56.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.39-56.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.39-56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10318.html</URL>
        <Description>CVE-2016-10318</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1032435</URL>
        <Description>SUSE Bug 1032435</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call.</Note>
    </Notes>
    <CVE>CVE-2017-2671</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.39-56.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.39-56.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.39-56.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.39-56.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.39-56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2671.html</URL>
        <Description>CVE-2017-2671</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1027179</URL>
        <Description>SUSE Bug 1027179</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1031003</URL>
        <Description>SUSE Bug 1031003</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel through 4.10.4 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function.</Note>
    </Notes>
    <CVE>CVE-2017-7187</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.39-56.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.39-56.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.39-56.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.39-56.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.39-56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7187.html</URL>
        <Description>CVE-2017-7187</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1027179</URL>
        <Description>SUSE Bug 1027179</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1030213</URL>
        <Description>SUSE Bug 1030213</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.5 does not check for a zero value of certain levels data, which allows local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device.</Note>
    </Notes>
    <CVE>CVE-2017-7261</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.39-56.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.39-56.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.39-56.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.39-56.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.39-56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7261.html</URL>
        <Description>CVE-2017-7261</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1027179</URL>
        <Description>SUSE Bug 1027179</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1031052</URL>
        <Description>SUSE Bug 1031052</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.6 does not validate addition of certain levels data, which allows local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device.</Note>
    </Notes>
    <CVE>CVE-2017-7294</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.39-56.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.39-56.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.39-56.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.39-56.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.39-56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7294.html</URL>
        <Description>CVE-2017-7294</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1027179</URL>
        <Description>SUSE Bug 1027179</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1031440</URL>
        <Description>SUSE Bug 1031440</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1031481</URL>
        <Description>SUSE Bug 1031481</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which allows local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_NET_RAW capability is held), via crafted system calls.</Note>
    </Notes>
    <CVE>CVE-2017-7308</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.39-56.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.39-56.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.39-56.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.39-56.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.39-56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.6</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7308.html</URL>
        <Description>CVE-2017-7308</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1027179</URL>
        <Description>SUSE Bug 1027179</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1031579</URL>
        <Description>SUSE Bug 1031579</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1031660</URL>
        <Description>SUSE Bug 1031660</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel through 4.10.9 allows local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation.</Note>
    </Notes>
    <CVE>CVE-2017-7616</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.39-56.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.39-56.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.39-56.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.39-56.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.39-56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7616.html</URL>
        <Description>CVE-2017-7616</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033336</URL>
        <Description>SUSE Bug 1033336</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">crypto/ahash.c in the Linux kernel through 4.10.9 allows attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue.</Note>
    </Notes>
    <CVE>CVE-2017-7618</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:kernel-debug-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-debug-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-default-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-4.1.39-56.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-html-4.1.39-56.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-docs-pdf-4.1.39-56.2</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-ec2-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-macros-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-build-4.1.39-56.3</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-obs-qa-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pae-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-pv-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-source-vanilla-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-syms-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-vanilla-devel-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-base-4.1.39-56.1</ProductID>
        <ProductID>openSUSE Leap 42.1:kernel-xen-devel-4.1.39-56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7618.html</URL>
        <Description>CVE-2017-7618</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033340</URL>
        <Description>SUSE Bug 1033340</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
