<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2018:0834-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-03-28T14:17:49Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-03-28T14:17:49Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-03-28T14:17:49Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
The SUSE Linux Enterprise 12 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-1068: Fixed flaw in the implementation of 32-bit syscall interface
  for bridging. This allowed a privileged user to arbitrarily write to a limited
  range of kernel memory (bnc#1085107).
- CVE-2017-18221: The __munlock_pagevec function allowed local users to cause a
  denial of service (NR_MLOCK accounting corruption) via crafted use of mlockall
  and munlockall system calls (bnc#1084323).
- CVE-2018-1066: Prevent NULL pointer dereference in
  fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() that allowed an attacker controlling a
  CIFS server to kernel panic a client that has this server mounted, because an
  empty TargetInfo field in an NTLMSSP setup negotiation response was mishandled
  during session recovery (bnc#1083640).
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the kernel
  v4l2 video driver (bnc#1072865).
- CVE-2017-16911: The vhci_hcd driver allowed local attackers to disclose
  kernel memory addresses. Successful exploitation required that a USB device was
  attached over IP (bnc#1078674).
- CVE-2017-15299: The KEYS subsystem mishandled use of add_key for a key that
  already exists but is uninstantiated, which allowed local users to cause a
  denial of service (NULL pointer dereference and system crash) or possibly have
  unspecified other impact via a crafted system call (bnc#1063416).
- CVE-2017-18208: The madvise_willneed function kernel allowed local users to
  cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED
  for a DAX mapping (bnc#1083494).
- CVE-2018-7566: The ALSA sequencer core initializes the event pool on demand
  by invoking snd_seq_pool_init() when the first write happens and the pool is
  empty. A user could have reset the pool size manually via ioctl concurrently,
  which may have lead UAF or out-of-bound access (bsc#1083483).
- CVE-2017-18204: The ocfs2_setattr function allowed local users to cause a
  denial of service (deadlock) via DIO requests (bnc#1083244).
- CVE-2017-16644: The hdpvr_probe function allowed local users to cause a
  denial of service (improper error handling and system crash) or possibly have
  unspecified other impact via a crafted USB device (bnc#1067118).
- CVE-2018-6927: The futex_requeue function allowed attackers to cause a denial
  of service (integer overflow) or possibly have unspecified other impact by
  triggering a negative wake or requeue value (bnc#1080757).
- CVE-2017-16914: The 'stub_send_ret_submit()' function allowed attackers to
  cause a denial of service (NULL pointer dereference) via a specially crafted
  USB over IP packet (bnc#1078669).
- CVE-2016-7915: The hid_input_field function allowed physically proximate
  attackers to obtain sensitive information from kernel memory or cause a denial
  of service (out-of-bounds read) by connecting a device (bnc#1010470).
- CVE-2017-12190: The bio_map_user_iov and bio_unmap_user functions did
  unbalanced refcounting when a SCSI I/O vector had small consecutive buffers
  belonging to the same page. The bio_add_pc_page function merged them into one,
  but the page reference was never dropped. This caused a memory leak and
  possible system lockup (exploitable against the host OS by a guest OS user, if
  a SCSI disk is passed through to a virtual machine) due to an out-of-memory
  condition (bnc#1062568).
- CVE-2017-16912: The 'get_pipe()' function allowed attackers to cause a denial
  of service (out-of-bounds read) via a specially crafted USB over IP packet
  (bnc#1078673).
- CVE-2017-16913: The 'stub_recv_cmd_submit()' function when handling
  CMD_SUBMIT packets allowed attackers to cause a denial of service (arbitrary
  memory allocation) via a specially crafted USB over IP packet (bnc#1078672).
- CVE-2018-5332: The rds_message_alloc_sgs() function did not validate a value
  that is used during DMA page allocation, leading to a heap-based out-of-bounds
  write (related to the rds_rdma_extra_size function in net/rds/rdma.c)
  (bnc#1075621).
- CVE-2018-5333: The rds_cmsg_atomic function in net/rds/rdma.c mishandled
  cases where page pinning fails or an invalid address is supplied, leading to an
  rds_atomic_free_op NULL pointer dereference (bnc#1075617).
- CVE-2017-18017: The tcpmss_mangle_packet function allowed remote attackers to
  cause a denial of service (use-after-free and memory corruption) or possibly
  have unspecified other impact by leveraging the presence of xt_TCPMSS in an
  iptables action (bnc#1074488).

The following non-security bugs were fixed:

- Fix build on arm64 by defining empty gmb() (bnc#1068032).
- KEYS: do not let add_key() update an uninstantiated key (bnc#1063416).
- KEYS: fix writing past end of user-supplied buffer in keyring_read() (bsc#1066001).
- KEYS: return full count in keyring_read() if buffer is too small (bsc#1066001).
- include/stddef.h: Move offsetofend() from vfio.h to a generic kernel header (bsc#1077560).
- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).
- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).
- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).
- x86/kaiser: use trampoline stack for kernel entry (bsc#1077560)
- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).
- livepatch: __kgr_shadow_get_or_alloc() is local to shadow.c. Shadow variables support (bsc#1082299).
- livepatch: introduce shadow variable API. Shadow variables support (bsc#1082299)
- media: v4l2-compat-ioctl32.c: add missing VIDIOC_PREPARE_BUF (bnc#1012382).
- media: v4l2-compat-ioctl32.c: avoid sizeof(type) (bnc#1012382).
- media: v4l2-compat-ioctl32.c: copy clip list in put_v4l2_window32 (bnc#1012382).
- media: v4l2-compat-ioctl32.c: copy m.userptr in put_v4l2_plane32 (bnc#1012382).
- media: v4l2-compat-ioctl32.c: do not copy back the result for certain errors (bnc#1012382).
- media: v4l2-compat-ioctl32.c: drop pr_info for unknown buffer type (bnc#1012382).
- media: v4l2-compat-ioctl32.c: fix the indentation (bnc#1012382).
- media: v4l2-compat-ioctl32.c: move 'helper' functions to __get/put_v4l2_format32 (bnc#1012382).
- media: v4l2-compat-ioctl32: Copy v4l2_window-&gt;global_alpha (bnc#1012382).
- media: v4l2-ioctl.c: do not copy back the result for -ENOTTY (bnc#1012382).
- netfilter: ebtables: CONFIG_COMPAT: do not trust userland offsets (bsc#1085107).
- netfilter: ebtables: fix erroneous reject of last rule (bsc#1085107).
- packet: only call dev_add_pack() on freshly allocated fanout instances
- pipe: cap initial pipe capacity according to pipe-max-size limit (bsc#1045330).
- x86/espfix: Fix return stack in do_double_fault() (bsc#1085279).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Module-Public-Cloud-12-2018-558,SUSE-SLE-SERVER-12-2018-558</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20180834-1/</URL>
      <Description>Link for SUSE-SU-2018:0834-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2018-March/003850.html</URL>
      <Description>E-Mail link for SUSE-SU-2018:0834-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010470</URL>
      <Description>SUSE Bug 1010470</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1012382</URL>
      <Description>SUSE Bug 1012382</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1045330</URL>
      <Description>SUSE Bug 1045330</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1062568</URL>
      <Description>SUSE Bug 1062568</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1063416</URL>
      <Description>SUSE Bug 1063416</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1066001</URL>
      <Description>SUSE Bug 1066001</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1067118</URL>
      <Description>SUSE Bug 1067118</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1068032</URL>
      <Description>SUSE Bug 1068032</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1072689</URL>
      <Description>SUSE Bug 1072689</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1072865</URL>
      <Description>SUSE Bug 1072865</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1074488</URL>
      <Description>SUSE Bug 1074488</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1075617</URL>
      <Description>SUSE Bug 1075617</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1075621</URL>
      <Description>SUSE Bug 1075621</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1077560</URL>
      <Description>SUSE Bug 1077560</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1078669</URL>
      <Description>SUSE Bug 1078669</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1078672</URL>
      <Description>SUSE Bug 1078672</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1078673</URL>
      <Description>SUSE Bug 1078673</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1078674</URL>
      <Description>SUSE Bug 1078674</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1080255</URL>
      <Description>SUSE Bug 1080255</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1080464</URL>
      <Description>SUSE Bug 1080464</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1080757</URL>
      <Description>SUSE Bug 1080757</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082299</URL>
      <Description>SUSE Bug 1082299</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1083244</URL>
      <Description>SUSE Bug 1083244</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1083483</URL>
      <Description>SUSE Bug 1083483</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1083494</URL>
      <Description>SUSE Bug 1083494</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1083640</URL>
      <Description>SUSE Bug 1083640</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1084323</URL>
      <Description>SUSE Bug 1084323</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1085107</URL>
      <Description>SUSE Bug 1085107</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1085114</URL>
      <Description>SUSE Bug 1085114</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1085279</URL>
      <Description>SUSE Bug 1085279</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1085447</URL>
      <Description>SUSE Bug 1085447</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7915/</URL>
      <Description>SUSE CVE CVE-2016-7915 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12190/</URL>
      <Description>SUSE CVE CVE-2017-12190 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13166/</URL>
      <Description>SUSE CVE CVE-2017-13166 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15299/</URL>
      <Description>SUSE CVE CVE-2017-15299 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-16644/</URL>
      <Description>SUSE CVE CVE-2017-16644 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-16911/</URL>
      <Description>SUSE CVE CVE-2017-16911 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-16912/</URL>
      <Description>SUSE CVE CVE-2017-16912 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-16913/</URL>
      <Description>SUSE CVE CVE-2017-16913 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-16914/</URL>
      <Description>SUSE CVE CVE-2017-16914 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-18017/</URL>
      <Description>SUSE CVE CVE-2017-18017 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-18204/</URL>
      <Description>SUSE CVE CVE-2017-18204 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-18208/</URL>
      <Description>SUSE CVE CVE-2017-18208 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-18221/</URL>
      <Description>SUSE CVE CVE-2017-18221 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1066/</URL>
      <Description>SUSE CVE CVE-2018-1066 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1068/</URL>
      <Description>SUSE CVE CVE-2018-1068 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5332/</URL>
      <Description>SUSE CVE CVE-2018-5332 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5333/</URL>
      <Description>SUSE CVE CVE-2018-5333 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-6927/</URL>
      <Description>SUSE CVE CVE-2018-6927 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7566/</URL>
      <Description>SUSE CVE CVE-2018-7566 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Public Cloud 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Public Cloud 12">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 12" CPE="cpe:/o:suse:sle-module-public-cloud:12">SUSE Linux Enterprise Module for Public Cloud 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS" CPE="cpe:/o:suse:sles-ltss:12">SUSE Linux Enterprise Server 12-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-3.12.61-52.125.1">
      <FullProductName ProductID="kernel-ec2-3.12.61-52.125.1">kernel-ec2-3.12.61-52.125.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-devel-3.12.61-52.125.1">
      <FullProductName ProductID="kernel-ec2-devel-3.12.61-52.125.1">kernel-ec2-devel-3.12.61-52.125.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-extra-3.12.61-52.125.1">
      <FullProductName ProductID="kernel-ec2-extra-3.12.61-52.125.1">kernel-ec2-extra-3.12.61-52.125.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-3.12.61-52.125.1">
      <FullProductName ProductID="kernel-default-3.12.61-52.125.1">kernel-default-3.12.61-52.125.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-3.12.61-52.125.1">
      <FullProductName ProductID="kernel-default-base-3.12.61-52.125.1">kernel-default-base-3.12.61-52.125.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-3.12.61-52.125.1">
      <FullProductName ProductID="kernel-default-devel-3.12.61-52.125.1">kernel-default-devel-3.12.61-52.125.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-man-3.12.61-52.125.1">
      <FullProductName ProductID="kernel-default-man-3.12.61-52.125.1">kernel-default-man-3.12.61-52.125.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-3.12.61-52.125.1">
      <FullProductName ProductID="kernel-devel-3.12.61-52.125.1">kernel-devel-3.12.61-52.125.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-macros-3.12.61-52.125.1">
      <FullProductName ProductID="kernel-macros-3.12.61-52.125.1">kernel-macros-3.12.61-52.125.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-3.12.61-52.125.1">
      <FullProductName ProductID="kernel-source-3.12.61-52.125.1">kernel-source-3.12.61-52.125.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-3.12.61-52.125.1">
      <FullProductName ProductID="kernel-syms-3.12.61-52.125.1">kernel-syms-3.12.61-52.125.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-3.12.61-52.125.1">
      <FullProductName ProductID="kernel-xen-3.12.61-52.125.1">kernel-xen-3.12.61-52.125.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-base-3.12.61-52.125.1">
      <FullProductName ProductID="kernel-xen-base-3.12.61-52.125.1">kernel-xen-base-3.12.61-52.125.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-devel-3.12.61-52.125.1">
      <FullProductName ProductID="kernel-xen-devel-3.12.61-52.125.1">kernel-xen-devel-3.12.61-52.125.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-3_12_61-52_125-default-1-1.3.1">
      <FullProductName ProductID="kgraft-patch-3_12_61-52_125-default-1-1.3.1">kgraft-patch-3_12_61-52_125-default-1-1.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-3_12_61-52_125-xen-1-1.3.1">
      <FullProductName ProductID="kgraft-patch-3_12_61-52_125-xen-1-1.3.1">kgraft-patch-3_12_61-52_125-xen-1-1.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-ec2-3.12.61-52.125.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Public Cloud 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1">kernel-ec2-3.12.61-52.125.1 as a component of SUSE Linux Enterprise Module for Public Cloud 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-devel-3.12.61-52.125.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Public Cloud 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1">kernel-ec2-devel-3.12.61-52.125.1 as a component of SUSE Linux Enterprise Module for Public Cloud 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-extra-3.12.61-52.125.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Public Cloud 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1">kernel-ec2-extra-3.12.61-52.125.1 as a component of SUSE Linux Enterprise Module for Public Cloud 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-3.12.61-52.125.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1">kernel-default-3.12.61-52.125.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-3.12.61-52.125.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1">kernel-default-base-3.12.61-52.125.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-3.12.61-52.125.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1">kernel-default-devel-3.12.61-52.125.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-man-3.12.61-52.125.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1">kernel-default-man-3.12.61-52.125.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-3.12.61-52.125.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1">kernel-devel-3.12.61-52.125.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-3.12.61-52.125.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1">kernel-macros-3.12.61-52.125.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-3.12.61-52.125.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1">kernel-source-3.12.61-52.125.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-3.12.61-52.125.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1">kernel-syms-3.12.61-52.125.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-3.12.61-52.125.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1">kernel-xen-3.12.61-52.125.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-base-3.12.61-52.125.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1">kernel-xen-base-3.12.61-52.125.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-devel-3.12.61-52.125.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1">kernel-xen-devel-3.12.61-52.125.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kgraft-patch-3_12_61-52_125-default-1-1.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1">kgraft-patch-3_12_61-52_125-default-1-1.3.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kgraft-patch-3_12_61-52_125-xen-1-1.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1">kgraft-patch-3_12_61-52_125-xen-1-1.3.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The hid_input_field function in drivers/hid/hid-core.c in the Linux kernel before 4.6 allows physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver.</Note>
    </Notes>
    <CVE>CVE-2016-7915</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:P/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20180834-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7915.html</URL>
        <Description>CVE-2016-7915</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010470</URL>
        <Description>SUSE Bug 1010470</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1091815</URL>
        <Description>SUSE Bug 1091815</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition.</Note>
    </Notes>
    <CVE>CVE-2017-12190</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:A/AC:L/Au:M/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20180834-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12190.html</URL>
        <Description>CVE-2017-12190</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1062568</URL>
        <Description>SUSE Bug 1062568</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1091815</URL>
        <Description>SUSE Bug 1091815</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.</Note>
    </Notes>
    <CVE>CVE-2017-13166</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20180834-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13166.html</URL>
        <Description>CVE-2017-13166</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1072865</URL>
        <Description>SUSE Bug 1072865</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074488</URL>
        <Description>SUSE Bug 1074488</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085447</URL>
        <Description>SUSE Bug 1085447</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1091815</URL>
        <Description>SUSE Bug 1091815</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The KEYS subsystem in the Linux kernel through 4.13.7 mishandles use of add_key for a key that already exists but is uninstantiated, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted system call.</Note>
    </Notes>
    <CVE>CVE-2017-15299</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20180834-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15299.html</URL>
        <Description>CVE-2017-15299</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1063416</URL>
        <Description>SUSE Bug 1063416</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device.</Note>
    </Notes>
    <CVE>CVE-2017-16644</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20180834-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16644.html</URL>
        <Description>CVE-2017-16644</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1067118</URL>
        <Description>SUSE Bug 1067118</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1091815</URL>
        <Description>SUSE Bug 1091815</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146519</URL>
        <Description>SUSE Bug 1146519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The vhci_hcd driver in the Linux Kernel before version 4.14.8 and 4.4.114 allows allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP.</Note>
    </Notes>
    <CVE>CVE-2017-16911</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20180834-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16911.html</URL>
        <Description>CVE-2017-16911</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078674</URL>
        <Description>SUSE Bug 1078674</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1091815</URL>
        <Description>SUSE Bug 1091815</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The "get_pipe()" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 allows attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet.</Note>
    </Notes>
    <CVE>CVE-2017-16912</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20180834-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16912.html</URL>
        <Description>CVE-2017-16912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078673</URL>
        <Description>SUSE Bug 1078673</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1091815</URL>
        <Description>SUSE Bug 1091815</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The "stub_recv_cmd_submit()" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 when handling CMD_SUBMIT packets allows attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet.</Note>
    </Notes>
    <CVE>CVE-2017-16913</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20180834-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16913.html</URL>
        <Description>CVE-2017-16913</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078672</URL>
        <Description>SUSE Bug 1078672</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1091815</URL>
        <Description>SUSE Bug 1091815</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The "stub_send_ret_submit()" function (drivers/usb/usbip/stub_tx.c) in the Linux Kernel before version 4.14.8, 4.9.71, 4.1.49, and 4.4.107 allows attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet.</Note>
    </Notes>
    <CVE>CVE-2017-16914</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20180834-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16914.html</URL>
        <Description>CVE-2017-16914</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078669</URL>
        <Description>SUSE Bug 1078669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1091815</URL>
        <Description>SUSE Bug 1091815</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.</Note>
    </Notes>
    <CVE>CVE-2017-18017</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20180834-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-18017.html</URL>
        <Description>CVE-2017-18017</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074488</URL>
        <Description>SUSE Bug 1074488</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1080255</URL>
        <Description>SUSE Bug 1080255</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1091815</URL>
        <Description>SUSE Bug 1091815</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971126</URL>
        <Description>SUSE Bug 971126</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ocfs2_setattr function in fs/ocfs2/file.c in the Linux kernel before 4.14.2 allows local users to cause a denial of service (deadlock) via DIO requests.</Note>
    </Notes>
    <CVE>CVE-2017-18204</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20180834-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-18204.html</URL>
        <Description>CVE-2017-18204</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083244</URL>
        <Description>SUSE Bug 1083244</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.</Note>
    </Notes>
    <CVE>CVE-2017-18208</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20180834-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-18208.html</URL>
        <Description>CVE-2017-18208</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083494</URL>
        <Description>SUSE Bug 1083494</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1091815</URL>
        <Description>SUSE Bug 1091815</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The __munlock_pagevec function in mm/mlock.c in the Linux kernel before 4.11.4 allows local users to cause a denial of service (NR_MLOCK accounting corruption) via crafted use of mlockall and munlockall system calls.</Note>
    </Notes>
    <CVE>CVE-2017-18221</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20180834-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-18221.html</URL>
        <Description>CVE-2017-18221</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1084323</URL>
        <Description>SUSE Bug 1084323</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Linux kernel before version 4.11 is vulnerable to a NULL pointer dereference in fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() that allows an attacker controlling a CIFS server to kernel panic a client that has this server mounted, because an empty TargetInfo field in an NTLMSSP setup negotiation response is mishandled during session recovery.</Note>
    </Notes>
    <CVE>CVE-2018-1066</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20180834-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1066.html</URL>
        <Description>CVE-2018-1066</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083640</URL>
        <Description>SUSE Bug 1083640</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.</Note>
    </Notes>
    <CVE>CVE-2018-1068</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20180834-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1068.html</URL>
        <Description>CVE-2018-1068</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085107</URL>
        <Description>SUSE Bug 1085107</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085114</URL>
        <Description>SUSE Bug 1085114</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123903</URL>
        <Description>SUSE Bug 1123903</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).</Note>
    </Notes>
    <CVE>CVE-2018-5332</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20180834-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5332.html</URL>
        <Description>CVE-2018-5332</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075621</URL>
        <Description>SUSE Bug 1075621</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1091815</URL>
        <Description>SUSE Bug 1091815</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2018-5333</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20180834-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5333.html</URL>
        <Description>CVE-2018-5333</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075617</URL>
        <Description>SUSE Bug 1075617</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1091815</URL>
        <Description>SUSE Bug 1091815</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The futex_requeue function in kernel/futex.c in the Linux kernel before 4.14.15 might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value.</Note>
    </Notes>
    <CVE>CVE-2018-6927</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20180834-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-6927.html</URL>
        <Description>CVE-2018-6927</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1080757</URL>
        <Description>SUSE Bug 1080757</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1091815</URL>
        <Description>SUSE Bug 1091815</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.</Note>
    </Notes>
    <CVE>CVE-2018-7566</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20180834-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7566.html</URL>
        <Description>CVE-2018-7566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083483</URL>
        <Description>SUSE Bug 1083483</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083488</URL>
        <Description>SUSE Bug 1083488</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1091815</URL>
        <Description>SUSE Bug 1091815</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
