<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2017:0437-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-02-09T15:37:43Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-02-09T15:37:43Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-02-09T15:37:43Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">

The SUSE Linux Enterprise 11 SP4 kernel was updated to 3.0.101-94 to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2017-5551: tmpfs: clear S_ISGID when setting posix ACLs (bsc#1021258).
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations
  where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations
  or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device
  NOTE: this vulnerability existed because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2016-5696: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers
  and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST
  packet, especially in protocols that use long-lived connections, such as BGP (bnc#989152).
- CVE-2015-1350: The VFS subsystem in the Linux kernel 3.x provided an incomplete set of requirements for setattr
  operations that underspecified removing extended privilege attributes, which allowed local users to cause a denial
  of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove
  a capability from the ping or Wireshark dumpcap program (bnc#914939).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship
  between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or
  cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability
  (bnc#1008831).
- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could enable a local
  malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate
  because it first requires compromising a privileged process and current compiler optimizations restrict access to the
  vulnerable code. (bnc#1014746).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of
  sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash)
  or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system
  call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).
- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of
  sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash)
  or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system
  call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain
  error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted
  application (bnc#1013038).
- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users
  to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel
  allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching
  a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking
  for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or
  possibly have unspecified other impact via crafted SCTP data (bnc#1011685).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel
  allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the
  corresponding start operation had failed (bnc#1010716).
- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local
  users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call
  (bnc#1010711).
- CVE-2013-6368: The KVM subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of
  service (system crash) via a VAPIC synchronization operation involving a page-end address (bnc#853052).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users
  to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users
  to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time
  interval in which environment-variable copying is incomplete (bnc#1010467).
- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a
  denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero
  bytes of data (bnc#1010150).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel, in certain unusual hardware configurations, allowed remote
  attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).

The following non-security bugs were fixed:

- 8250_pci: Fix potential use-after-free in error path (bsc#1013070).
- KABI fix (bsc#1014410).
- apparmor: fix IRQ stack overflow during free_profile (bsc#1009875).
- be2net: Do not leak iomapped memory on removal (bug#925065).
- block_dev: do not test bdev-&gt;bd_contains when it is not stable (bsc#1008557).
- bna: Add synchronization for tx ring (bsc#993739).
- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).
- crypto: add ghash-generic in the supported.conf(bsc#1016824)
- crypto: aesni - Add support for 192 &amp; 256 bit keys to AESNI RFC4106 (bsc#913387).
- dm: do not call dm_sync_table() when creating new devices (bnc#901809).
- drm/mgag200: Added support for the new deviceID for G200eW3 (bnc#1019348)
- ext3: Avoid premature failure of ext3_has_free_blocks() (bsc#1016668).
- ext4: do not leave i_crtime.tv_sec uninitialized (bsc#1013018).
- ext4: fix reference counting bug on block allocation error (bsc#1013018).
- futex: Acknowledge a new waiter in counter before plist (bsc#851603).
- futex: Drop refcount if requeue_pi() acquired the rtmutex (bsc#851603).
- hpilo: Add support for iLO5 (bsc#999101).
- ibmveth: calculate gso_segs for large packets (bsc#1019165).
- ibmveth: set correct gso_size and gso_type (bsc#1019165).
- igb: Enable SR-IOV configuration via PCI sysfs interface (bsc#909491 FATE#317388).
- igb: Fix NULL assignment to incorrect variable in igb_reset_q_vector (bsc#795297 FATE#313656).
- igb: Fix oops caused by missing queue pairing (bsc#909491 FATE#317388).
- igb: Fix oops on changing number of rings (bsc#909491 FATE#317388).
- igb: Remove unnecessary flag setting in igb_set_flag_queue_pairs() (bsc#909491 FATE#317388).
- igb: Unpair the queues when changing the number of queues (bsc#909491 FATE#317388).
- kexec: add a kexec_crash_loaded() function (bsc#973691).
- kvm: APIC: avoid instruction emulation for EOI writes (bsc#989680).
- kvm: Distangle eventfd code from irqchip (bsc#989680).
- kvm: Iterate over only vcpus that are preempted (bsc#989680).
- kvm: Record the preemption status of vcpus using preempt notifiers (bsc#989680).
- kvm: VMX: Pass vcpu to __vmx_complete_interrupts (bsc#989680).
- kvm: fold kvm_pit_timer into kvm_kpit_state (bsc#989680).
- kvm: make processes waiting on vcpu mutex killable (bsc#989680).
- kvm: nVMX: Add preemption timer support (bsc#989680).
- kvm: remove a wrong hack of delivery PIT intr to vcpu0 (bsc#989680).
- kvm: use symbolic constant for nr interrupts (bsc#989680).
- kvm: x86: Remove support for reporting coalesced APIC IRQs (bsc#989680).
- kvm: x86: Run PIT work in own kthread (bsc#989680).
- kvm: x86: limit difference between kvmclock updates (bsc#989680).
- libata: introduce ata_host-&gt;n_tags to avoid oops on SAS controllers (bsc#871728).
- libata: remove n_tags to avoid kABI breakage (bsc#871728).
- libfc: Do not take rdata-&gt;rp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).
- libfc: Fixup disc_mutex handling (bsc#962846).
- libfc: Issue PRLI after a PRLO has been received (bsc#962846).
- libfc: Revisit kref handling (bnc#990245).
- libfc: Update rport reference counting (bsc#953233).
- libfc: do not send ABTS when resetting exchanges (bsc#962846).
- libfc: fixup locking of ptp_setup() (bsc#962846).
- libfc: reset exchange manager during LOGO handling (bsc#962846).
- libfc: send LOGO for PLOGI failure (bsc#962846).
- locking/mutex: Explicitly mark task as running after wakeup (bsc#1012411).
- memstick: mspro_block: add missing curly braces (bsc#1016688).
- mlx4: Fix error flow when sending mads under SRIOV (bsc#786036 FATE#314304).
- mlx4: Fix incorrect MC join state bit-masking on SR-IOV (bsc#786036 FATE#314304).
- mlx4: Fix memory leak if QP creation failed (bsc#786036 FATE#314304).
- mlx4: Fix potential deadlock when sending mad to wire (bsc#786036 FATE#314304).
- mlx4: Forbid using sysfs to change RoCE pkeys (bsc#786036 FATE#314304).
- mlx4: Use correct subnet-prefix in QP1 mads under SR-IOV (bsc#786036 FATE#314304).
- mlx4: add missing braces in verify_qp_parameters (bsc#786036 FATE#314304).
- mm/memory_hotplug.c: check for missing sections in test_pages_in_a_zone() (bnc#961589).
- mm: fix crashes from mbind() merging vmas (bnc#1005877).
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).
- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (bsc#1008645).
- net/mlx4: Copy/set only sizeof struct mlx4_eqe bytes (bsc#786036 FATE#314304).
- net/mlx4_core: Allow resetting VF admin mac to zero (bsc#919382 FATE#317529).
- net/mlx4_core: Avoid returning success in case of an error flow (bsc#786036 FATE#314304).
- net/mlx4_core: Do not BUG_ON during reset when PCI is offline (bsc#924708).
- net/mlx4_core: Do not access comm channel if it has not yet been initialized (bsc#924708).
- net/mlx4_core: Fix error message deprecation for ConnectX-2 cards (bsc#919382 FATE#317529).
- net/mlx4_core: Fix the resource-type enum in res tracker to conform to FW spec (bsc#786036 FATE#314304).
- net/mlx4_core: Implement pci_resume callback (bsc#924708).
- net/mlx4_core: Update the HCA core clock frequency after INIT_PORT (bug#919382 FATE#317529).
- net/mlx4_en: Choose time-stamping shift value according to HW frequency (bsc#919382 FATE#317529).
- net/mlx4_en: Fix HW timestamp init issue upon system startup (bsc#919382 FATE#317529).
- net/mlx4_en: Fix potential deadlock in port statistics flow (bsc#786036 FATE#314304).
- net/mlx4_en: Move filters cleanup to a proper location (bsc#786036 FATE#314304).
- net/mlx4_en: Remove dependency between timestamping capability and service_task (bsc#919382 FATE#317529).
- net/mlx4_en: fix spurious timestamping callbacks (bsc#919382 FATE#317529).
- netfront: do not truncate grant references.
- nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).
- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).
- nfsv4: Handle timeouts correctly when probing for lease validity (bsc#1014410).
- nvme: Automatic namespace rescan (bsc#1017686).
- nvme: Metadata format support (bsc#1017686).
- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).
- posix-timers: Remove remaining uses of tasklist_lock (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock for task clock sample (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (bnc#997401).
- powerpc/MSI: Fix race condition in tearing down MSI interrupts (bsc#1010201).
- powerpc/mm/hash64: Fix subpage protection with 4K HPTE config (bsc#1010201).
- powerpc/numa: Fix multiple bugs in memory_hotplug_max() (bsc#1010201).
- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813).
- powerpc: fix typo 'CONFIG_PPC_CPU' (bsc#1010201).
- powerpc: scan_features() updates incorrect bits for REAL_LE (bsc#1010201).
- printk/sched: Introduce special printk_sched() for those awkward (bsc#996541).
- ptrace: __ptrace_may_access() should not deny sub-threads (bsc#1012851).
- qlcnic: fix a loop exit condition better (bsc#909350 FATE#317546).
- qlcnic: use the correct ring in qlcnic_83xx_process_rcv_ring_diag() (bnc#800999 FATE#313899).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rpm/constraints.in: Bump ppc64 disk requirements to fix OBS builds again
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- rt2x00: fix rfkill regression on rt2500pci (bnc#748806).
- s390/zcrypt: kernel: Fix invalid domain response handling (bsc#1016320).
- scsi: Fix erratic device offline during EH (bsc#993832).
- scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557).
- scsi: lpfc: avoid double free of resource identifiers (bsc#989896).
- scsi_error: count medium access timeout only once per EH run (bsc#993832).
- scsi_error: fixup crash in scsi_eh_reset (bsc#993832)
- serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013070).
- sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917).
- sunrpc: Fix reconnection timeouts (bsc#1014410).
- sunrpc: Fix two issues with drop_caches and the sunrpc auth cache (bsc#1012917).
- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).
- tcp: fix inet6_csk_route_req() for link-local addresses (bsc#1010175).
- tcp: pass fl6 to inet6_csk_route_req() (bsc#1010175).
- tcp: plug dst leak in tcp_v6_conn_request() (bsc#1010175).
- tcp: use inet6_csk_route_req() in tcp_v6_send_synack() (bsc#1010175).
- tg3: Fix temperature reporting (bnc#790588 FATE#313912).
- usb: console: fix potential use after free (bsc#1015817).
- usb: console: fix uninitialised ldisc semaphore (bsc#1015817).
- usb: cp210x: Corrected USB request type definitions (bsc#1015932).
- usb: cp210x: relocate private data from USB interface to port (bsc#1015932).
- usb: cp210x: work around cp2108 GET_LINE_CTL bug (bsc#1015932).
- usb: ftdi_sio: fix null deref at port probe (bsc#1015796).
- usb: ipaq.c: fix a timeout loop (bsc#1015848).
- usb: opticon: fix non-atomic allocation in write path (bsc#1015803).
- usb: option: fix runtime PM handling (bsc#1015752).
- usb: serial: cp210x: add 16-bit register access functions (bsc#1015932).
- usb: serial: cp210x: add 8-bit and 32-bit register access functions (bsc#1015932).
- usb: serial: cp210x: add new access functions for large registers (bsc#1015932).
- usb: serial: cp210x: fix hardware flow-control disable (bsc#1015932).
- usb: serial: fix potential use-after-free after failed probe (bsc#1015828).
- usb: serial: io_edgeport: fix memory leaks in attach error path (bsc#1016505).
- usb: serial: io_edgeport: fix memory leaks in probe error path (bsc#1016505).
- usb: serial: keyspan: fix use-after-free in probe error path (bsc#1016520).
- usb: sierra: fix AA deadlock in open error path (bsc#1015561).
- usb: sierra: fix remote wakeup (bsc#1015561).
- usb: sierra: fix urb and memory leak in resume error path (bsc#1015561).
- usb: sierra: fix urb and memory leak on disconnect (bsc#1015561).
- usb: sierra: fix use after free at suspend/resume (bsc#1015561).
- usb: usb_wwan: fix potential blocked I/O after resume (bsc#1015760).
- usb: usb_wwan: fix race between write and resume (bsc#1015760).
- usb: usb_wwan: fix urb leak at shutdown (bsc#1015760).
- usb: usb_wwan: fix urb leak in write error path (bsc#1015760).
- usb: usb_wwan: fix write and suspend race (bsc#1015760).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- usblp: do not set TASK_INTERRUPTIBLE before lock (bsc#1015844).
- xenbus: do not invoke is_ready() for most device states (bsc#987333).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">sdksp4-kernel-12977,slessp4-kernel-12977,slexsp3-kernel-12977</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170437-1/</URL>
      <Description>Link for SUSE-SU-2017:0437-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2017-February/002637.html</URL>
      <Description>E-Mail link for SUSE-SU-2017:0437-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1003813</URL>
      <Description>SUSE Bug 1003813</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1005877</URL>
      <Description>SUSE Bug 1005877</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1007615</URL>
      <Description>SUSE Bug 1007615</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1008557</URL>
      <Description>SUSE Bug 1008557</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1008645</URL>
      <Description>SUSE Bug 1008645</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1008831</URL>
      <Description>SUSE Bug 1008831</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1008833</URL>
      <Description>SUSE Bug 1008833</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1008893</URL>
      <Description>SUSE Bug 1008893</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1009875</URL>
      <Description>SUSE Bug 1009875</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010150</URL>
      <Description>SUSE Bug 1010150</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010175</URL>
      <Description>SUSE Bug 1010175</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010201</URL>
      <Description>SUSE Bug 1010201</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010467</URL>
      <Description>SUSE Bug 1010467</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010501</URL>
      <Description>SUSE Bug 1010501</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010507</URL>
      <Description>SUSE Bug 1010507</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010711</URL>
      <Description>SUSE Bug 1010711</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010713</URL>
      <Description>SUSE Bug 1010713</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010716</URL>
      <Description>SUSE Bug 1010716</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1011685</URL>
      <Description>SUSE Bug 1011685</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1011820</URL>
      <Description>SUSE Bug 1011820</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1012183</URL>
      <Description>SUSE Bug 1012183</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1012411</URL>
      <Description>SUSE Bug 1012411</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1012422</URL>
      <Description>SUSE Bug 1012422</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1012832</URL>
      <Description>SUSE Bug 1012832</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1012851</URL>
      <Description>SUSE Bug 1012851</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1012852</URL>
      <Description>SUSE Bug 1012852</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1012917</URL>
      <Description>SUSE Bug 1012917</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1013018</URL>
      <Description>SUSE Bug 1013018</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1013038</URL>
      <Description>SUSE Bug 1013038</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1013042</URL>
      <Description>SUSE Bug 1013042</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1013070</URL>
      <Description>SUSE Bug 1013070</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1013531</URL>
      <Description>SUSE Bug 1013531</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1013542</URL>
      <Description>SUSE Bug 1013542</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1014410</URL>
      <Description>SUSE Bug 1014410</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1014454</URL>
      <Description>SUSE Bug 1014454</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1014746</URL>
      <Description>SUSE Bug 1014746</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1015561</URL>
      <Description>SUSE Bug 1015561</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1015752</URL>
      <Description>SUSE Bug 1015752</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1015760</URL>
      <Description>SUSE Bug 1015760</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1015796</URL>
      <Description>SUSE Bug 1015796</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1015803</URL>
      <Description>SUSE Bug 1015803</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1015817</URL>
      <Description>SUSE Bug 1015817</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1015828</URL>
      <Description>SUSE Bug 1015828</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1015844</URL>
      <Description>SUSE Bug 1015844</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1015848</URL>
      <Description>SUSE Bug 1015848</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1015878</URL>
      <Description>SUSE Bug 1015878</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1015932</URL>
      <Description>SUSE Bug 1015932</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1016320</URL>
      <Description>SUSE Bug 1016320</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1016505</URL>
      <Description>SUSE Bug 1016505</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1016520</URL>
      <Description>SUSE Bug 1016520</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1016668</URL>
      <Description>SUSE Bug 1016668</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1016688</URL>
      <Description>SUSE Bug 1016688</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1016824</URL>
      <Description>SUSE Bug 1016824</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1016831</URL>
      <Description>SUSE Bug 1016831</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1017686</URL>
      <Description>SUSE Bug 1017686</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1017710</URL>
      <Description>SUSE Bug 1017710</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1019079</URL>
      <Description>SUSE Bug 1019079</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1019148</URL>
      <Description>SUSE Bug 1019148</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1019165</URL>
      <Description>SUSE Bug 1019165</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1019348</URL>
      <Description>SUSE Bug 1019348</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1019783</URL>
      <Description>SUSE Bug 1019783</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1020214</URL>
      <Description>SUSE Bug 1020214</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1021258</URL>
      <Description>SUSE Bug 1021258</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/748806</URL>
      <Description>SUSE Bug 748806</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/786036</URL>
      <Description>SUSE Bug 786036</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/790588</URL>
      <Description>SUSE Bug 790588</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/795297</URL>
      <Description>SUSE Bug 795297</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/800999</URL>
      <Description>SUSE Bug 800999</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/821612</URL>
      <Description>SUSE Bug 821612</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/824171</URL>
      <Description>SUSE Bug 824171</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/851603</URL>
      <Description>SUSE Bug 851603</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/853052</URL>
      <Description>SUSE Bug 853052</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/871728</URL>
      <Description>SUSE Bug 871728</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/901809</URL>
      <Description>SUSE Bug 901809</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/909350</URL>
      <Description>SUSE Bug 909350</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/909491</URL>
      <Description>SUSE Bug 909491</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/913387</URL>
      <Description>SUSE Bug 913387</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/914939</URL>
      <Description>SUSE Bug 914939</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/919382</URL>
      <Description>SUSE Bug 919382</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/924708</URL>
      <Description>SUSE Bug 924708</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/925065</URL>
      <Description>SUSE Bug 925065</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/953233</URL>
      <Description>SUSE Bug 953233</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/961589</URL>
      <Description>SUSE Bug 961589</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/962846</URL>
      <Description>SUSE Bug 962846</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/969340</URL>
      <Description>SUSE Bug 969340</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/973691</URL>
      <Description>SUSE Bug 973691</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/987333</URL>
      <Description>SUSE Bug 987333</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/987576</URL>
      <Description>SUSE Bug 987576</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/989152</URL>
      <Description>SUSE Bug 989152</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/989680</URL>
      <Description>SUSE Bug 989680</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/989896</URL>
      <Description>SUSE Bug 989896</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/990245</URL>
      <Description>SUSE Bug 990245</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/992991</URL>
      <Description>SUSE Bug 992991</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/993739</URL>
      <Description>SUSE Bug 993739</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/993832</URL>
      <Description>SUSE Bug 993832</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/996541</URL>
      <Description>SUSE Bug 996541</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/996557</URL>
      <Description>SUSE Bug 996557</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/997401</URL>
      <Description>SUSE Bug 997401</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/999101</URL>
      <Description>SUSE Bug 999101</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2004-0230/</URL>
      <Description>SUSE CVE CVE-2004-0230 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-6704/</URL>
      <Description>SUSE CVE CVE-2012-6704 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-6368/</URL>
      <Description>SUSE CVE CVE-2013-6368 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1350/</URL>
      <Description>SUSE CVE CVE-2015-1350 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8962/</URL>
      <Description>SUSE CVE CVE-2015-8962 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8964/</URL>
      <Description>SUSE CVE CVE-2015-8964 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10088/</URL>
      <Description>SUSE CVE CVE-2016-10088 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5696/</URL>
      <Description>SUSE CVE CVE-2016-5696 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7910/</URL>
      <Description>SUSE CVE CVE-2016-7910 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7911/</URL>
      <Description>SUSE CVE CVE-2016-7911 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7916/</URL>
      <Description>SUSE CVE CVE-2016-7916 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8399/</URL>
      <Description>SUSE CVE CVE-2016-8399 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8632/</URL>
      <Description>SUSE CVE CVE-2016-8632 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8633/</URL>
      <Description>SUSE CVE CVE-2016-8633 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8646/</URL>
      <Description>SUSE CVE CVE-2016-8646 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9555/</URL>
      <Description>SUSE CVE CVE-2016-9555 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9685/</URL>
      <Description>SUSE CVE CVE-2016-9685 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9756/</URL>
      <Description>SUSE CVE CVE-2016-9756 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9793/</URL>
      <Description>SUSE CVE CVE-2016-9793 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5551/</URL>
      <Description>SUSE CVE CVE-2017-5551 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4" CPE="cpe:/o:suse:suse_sles:11:sp4">SUSE Linux Enterprise Server 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4" CPE="cpe:/o:suse:sles_sap:11:sp4">SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4" CPE="cpe:/a:suse:sle-sdk:11:sp4">SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-3.0.101-94.2">
      <FullProductName ProductID="kernel-docs-3.0.101-94.2">kernel-docs-3.0.101-94.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-bigmem-3.0.101-94.1">
      <FullProductName ProductID="kernel-bigmem-3.0.101-94.1">kernel-bigmem-3.0.101-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-bigmem-base-3.0.101-94.1">
      <FullProductName ProductID="kernel-bigmem-base-3.0.101-94.1">kernel-bigmem-base-3.0.101-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-bigmem-devel-3.0.101-94.1">
      <FullProductName ProductID="kernel-bigmem-devel-3.0.101-94.1">kernel-bigmem-devel-3.0.101-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-3.0.101-94.1">
      <FullProductName ProductID="kernel-default-3.0.101-94.1">kernel-default-3.0.101-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-3.0.101-94.1">
      <FullProductName ProductID="kernel-default-base-3.0.101-94.1">kernel-default-base-3.0.101-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-3.0.101-94.1">
      <FullProductName ProductID="kernel-default-devel-3.0.101-94.1">kernel-default-devel-3.0.101-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-man-3.0.101-94.1">
      <FullProductName ProductID="kernel-default-man-3.0.101-94.1">kernel-default-man-3.0.101-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-3.0.101-94.1">
      <FullProductName ProductID="kernel-ec2-3.0.101-94.1">kernel-ec2-3.0.101-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-base-3.0.101-94.1">
      <FullProductName ProductID="kernel-ec2-base-3.0.101-94.1">kernel-ec2-base-3.0.101-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-devel-3.0.101-94.1">
      <FullProductName ProductID="kernel-ec2-devel-3.0.101-94.1">kernel-ec2-devel-3.0.101-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-3.0.101-94.1">
      <FullProductName ProductID="kernel-pae-3.0.101-94.1">kernel-pae-3.0.101-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-base-3.0.101-94.1">
      <FullProductName ProductID="kernel-pae-base-3.0.101-94.1">kernel-pae-base-3.0.101-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-devel-3.0.101-94.1">
      <FullProductName ProductID="kernel-pae-devel-3.0.101-94.1">kernel-pae-devel-3.0.101-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ppc64-3.0.101-94.1">
      <FullProductName ProductID="kernel-ppc64-3.0.101-94.1">kernel-ppc64-3.0.101-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ppc64-base-3.0.101-94.1">
      <FullProductName ProductID="kernel-ppc64-base-3.0.101-94.1">kernel-ppc64-base-3.0.101-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ppc64-devel-3.0.101-94.1">
      <FullProductName ProductID="kernel-ppc64-devel-3.0.101-94.1">kernel-ppc64-devel-3.0.101-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-3.0.101-94.1">
      <FullProductName ProductID="kernel-source-3.0.101-94.1">kernel-source-3.0.101-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-3.0.101-94.1">
      <FullProductName ProductID="kernel-syms-3.0.101-94.1">kernel-syms-3.0.101-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-3.0.101-94.1">
      <FullProductName ProductID="kernel-trace-3.0.101-94.1">kernel-trace-3.0.101-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-base-3.0.101-94.1">
      <FullProductName ProductID="kernel-trace-base-3.0.101-94.1">kernel-trace-base-3.0.101-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-devel-3.0.101-94.1">
      <FullProductName ProductID="kernel-trace-devel-3.0.101-94.1">kernel-trace-devel-3.0.101-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-3.0.101-94.1">
      <FullProductName ProductID="kernel-xen-3.0.101-94.1">kernel-xen-3.0.101-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-base-3.0.101-94.1">
      <FullProductName ProductID="kernel-xen-base-3.0.101-94.1">kernel-xen-base-3.0.101-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-devel-3.0.101-94.1">
      <FullProductName ProductID="kernel-xen-devel-3.0.101-94.1">kernel-xen-devel-3.0.101-94.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-bigmem-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1">kernel-bigmem-3.0.101-94.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-bigmem-base-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1">kernel-bigmem-base-3.0.101-94.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-bigmem-devel-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1">kernel-bigmem-devel-3.0.101-94.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1">kernel-default-3.0.101-94.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1">kernel-default-base-3.0.101-94.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1">kernel-default-devel-3.0.101-94.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-man-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1">kernel-default-man-3.0.101-94.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1">kernel-ec2-3.0.101-94.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-base-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1">kernel-ec2-base-3.0.101-94.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-devel-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1">kernel-ec2-devel-3.0.101-94.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1">kernel-pae-3.0.101-94.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-base-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1">kernel-pae-base-3.0.101-94.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-devel-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1">kernel-pae-devel-3.0.101-94.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ppc64-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1">kernel-ppc64-3.0.101-94.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ppc64-base-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1">kernel-ppc64-base-3.0.101-94.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ppc64-devel-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1">kernel-ppc64-devel-3.0.101-94.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1">kernel-source-3.0.101-94.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1">kernel-syms-3.0.101-94.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-trace-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1">kernel-trace-3.0.101-94.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-trace-base-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1">kernel-trace-base-3.0.101-94.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-trace-devel-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1">kernel-trace-devel-3.0.101-94.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1">kernel-xen-3.0.101-94.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-base-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1">kernel-xen-base-3.0.101-94.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-devel-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1">kernel-xen-devel-3.0.101-94.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-bigmem-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1">kernel-bigmem-3.0.101-94.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-bigmem-base-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1">kernel-bigmem-base-3.0.101-94.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-bigmem-devel-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1">kernel-bigmem-devel-3.0.101-94.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1">kernel-default-3.0.101-94.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1">kernel-default-base-3.0.101-94.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1">kernel-default-devel-3.0.101-94.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-man-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1">kernel-default-man-3.0.101-94.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1">kernel-ec2-3.0.101-94.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-base-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1">kernel-ec2-base-3.0.101-94.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-devel-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1">kernel-ec2-devel-3.0.101-94.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1">kernel-pae-3.0.101-94.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-base-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1">kernel-pae-base-3.0.101-94.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-pae-devel-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1">kernel-pae-devel-3.0.101-94.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ppc64-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1">kernel-ppc64-3.0.101-94.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ppc64-base-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1">kernel-ppc64-base-3.0.101-94.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ppc64-devel-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1">kernel-ppc64-devel-3.0.101-94.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1">kernel-source-3.0.101-94.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1">kernel-syms-3.0.101-94.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-trace-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1">kernel-trace-3.0.101-94.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-trace-base-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1">kernel-trace-base-3.0.101-94.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-trace-devel-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1">kernel-trace-devel-3.0.101-94.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1">kernel-xen-3.0.101-94.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-base-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1">kernel-xen-base-3.0.101-94.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-devel-3.0.101-94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1">kernel-xen-devel-3.0.101-94.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-3.0.101-94.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2">kernel-docs-3.0.101-94.2 as a component of SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.</Note>
    </Notes>
    <CVE>CVE-2004-0230</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2004-0230.html</URL>
        <Description>CVE-2004-0230</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184394</URL>
        <Description>SUSE Bug 1184394</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1198501</URL>
        <Description>SUSE Bug 1198501</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1206598</URL>
        <Description>SUSE Bug 1206598</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969340</URL>
        <Description>SUSE Bug 969340</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989152</URL>
        <Description>SUSE Bug 989152</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/992991</URL>
        <Description>SUSE Bug 992991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option.</Note>
    </Notes>
    <CVE>CVE-2012-6704</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.6</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-6704.html</URL>
        <Description>CVE-2012-6704</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013531</URL>
        <Description>SUSE Bug 1013531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013542</URL>
        <Description>SUSE Bug 1013542</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address.</Note>
    </Notes>
    <CVE>CVE-2013-6368</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-6368.html</URL>
        <Description>CVE-2013-6368</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/853052</URL>
        <Description>SUSE Bug 853052</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.</Note>
    </Notes>
    <CVE>CVE-2015-1350</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1350.html</URL>
        <Description>CVE-2015-1350</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052256</URL>
        <Description>SUSE Bug 1052256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/914939</URL>
        <Description>SUSE Bug 914939</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.</Note>
    </Notes>
    <CVE>CVE-2015-8962</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.9</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:P/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8962.html</URL>
        <Description>CVE-2015-8962</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010501</URL>
        <Description>SUSE Bug 1010501</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.</Note>
    </Notes>
    <CVE>CVE-2015-8964</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8964.html</URL>
        <Description>CVE-2015-8964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010507</URL>
        <Description>SUSE Bug 1010507</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.</Note>
    </Notes>
    <CVE>CVE-2016-10088</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10088.html</URL>
        <Description>CVE-2016-10088</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013604</URL>
        <Description>SUSE Bug 1013604</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014271</URL>
        <Description>SUSE Bug 1014271</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1017710</URL>
        <Description>SUSE Bug 1017710</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1019079</URL>
        <Description>SUSE Bug 1019079</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.</Note>
    </Notes>
    <CVE>CVE-2016-5696</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5696.html</URL>
        <Description>CVE-2016-5696</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020452</URL>
        <Description>SUSE Bug 1020452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175721</URL>
        <Description>SUSE Bug 1175721</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989152</URL>
        <Description>SUSE Bug 989152</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.</Note>
    </Notes>
    <CVE>CVE-2016-7910</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7910.html</URL>
        <Description>CVE-2016-7910</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010716</URL>
        <Description>SUSE Bug 1010716</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196722</URL>
        <Description>SUSE Bug 1196722</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.</Note>
    </Notes>
    <CVE>CVE-2016-7911</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7911.html</URL>
        <Description>CVE-2016-7911</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010711</URL>
        <Description>SUSE Bug 1010711</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010713</URL>
        <Description>SUSE Bug 1010713</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the environ_read function in fs/proc/base.c in the Linux kernel before 4.5.4 allows local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete.</Note>
    </Notes>
    <CVE>CVE-2016-7916</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7916.html</URL>
        <Description>CVE-2016-7916</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010467</URL>
        <Description>SUSE Bug 1010467</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.</Note>
    </Notes>
    <CVE>CVE-2016-8399</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.2</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:P/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8399.html</URL>
        <Description>CVE-2016-8399</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014746</URL>
        <Description>SUSE Bug 1014746</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.</Note>
    </Notes>
    <CVE>CVE-2016-8632</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8632.html</URL>
        <Description>CVE-2016-8632</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008831</URL>
        <Description>SUSE Bug 1008831</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012852</URL>
        <Description>SUSE Bug 1012852</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.</Note>
    </Notes>
    <CVE>CVE-2016-8633</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8633.html</URL>
        <Description>CVE-2016-8633</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008833</URL>
        <Description>SUSE Bug 1008833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.</Note>
    </Notes>
    <CVE>CVE-2016-8646</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8646.html</URL>
        <Description>CVE-2016-8646</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010150</URL>
        <Description>SUSE Bug 1010150</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.</Note>
    </Notes>
    <CVE>CVE-2016-9555</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:C/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9555.html</URL>
        <Description>CVE-2016-9555</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011685</URL>
        <Description>SUSE Bug 1011685</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012183</URL>
        <Description>SUSE Bug 1012183</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.</Note>
    </Notes>
    <CVE>CVE-2016-9685</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9685.html</URL>
        <Description>CVE-2016-9685</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012832</URL>
        <Description>SUSE Bug 1012832</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.</Note>
    </Notes>
    <CVE>CVE-2016-9756</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9756.html</URL>
        <Description>CVE-2016-9756</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013038</URL>
        <Description>SUSE Bug 1013038</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.</Note>
    </Notes>
    <CVE>CVE-2016-9793</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.9</BaseScore>
        <Vector>AV:L/AC:H/Au:M/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9793.html</URL>
        <Description>CVE-2016-9793</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013531</URL>
        <Description>SUSE Bug 1013531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013542</URL>
        <Description>SUSE Bug 1013542</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.</Note>
    </Notes>
    <CVE>CVE-2017-5551</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>3.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5551.html</URL>
        <Description>CVE-2017-5551</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021258</URL>
        <Description>SUSE Bug 1021258</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/995968</URL>
        <Description>SUSE Bug 995968</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
