<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libvirt-2.5.0-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10209-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libvirt-2.5.0-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libvirt-2.5.0-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10209</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-2242/</URL>
      <Description>SUSE CVE CVE-2010-2242 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1146/</URL>
      <Description>SUSE CVE CVE-2011-1146 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-2511/</URL>
      <Description>SUSE CVE CVE-2011-2511 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-4600/</URL>
      <Description>SUSE CVE CVE-2011-4600 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-3445/</URL>
      <Description>SUSE CVE CVE-2012-3445 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-0170/</URL>
      <Description>SUSE CVE CVE-2013-0170 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1962/</URL>
      <Description>SUSE CVE CVE-2013-1962 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2218/</URL>
      <Description>SUSE CVE CVE-2013-2218 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2230/</URL>
      <Description>SUSE CVE CVE-2013-2230 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4153/</URL>
      <Description>SUSE CVE CVE-2013-4153 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4154/</URL>
      <Description>SUSE CVE CVE-2013-4154 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4239/</URL>
      <Description>SUSE CVE CVE-2013-4239 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4296/</URL>
      <Description>SUSE CVE CVE-2013-4296 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4297/</URL>
      <Description>SUSE CVE CVE-2013-4297 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4311/</URL>
      <Description>SUSE CVE CVE-2013-4311 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4399/</URL>
      <Description>SUSE CVE CVE-2013-4399 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4400/</URL>
      <Description>SUSE CVE CVE-2013-4400 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4401/</URL>
      <Description>SUSE CVE CVE-2013-4401 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-6436/</URL>
      <Description>SUSE CVE CVE-2013-6436 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-6456/</URL>
      <Description>SUSE CVE CVE-2013-6456 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-6457/</URL>
      <Description>SUSE CVE CVE-2013-6457 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-6458/</URL>
      <Description>SUSE CVE CVE-2013-6458 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0028/</URL>
      <Description>SUSE CVE CVE-2014-0028 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0179/</URL>
      <Description>SUSE CVE CVE-2014-0179 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-1447/</URL>
      <Description>SUSE CVE CVE-2014-1447 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3633/</URL>
      <Description>SUSE CVE CVE-2014-3633 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3657/</URL>
      <Description>SUSE CVE CVE-2014-3657 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-7823/</URL>
      <Description>SUSE CVE CVE-2014-7823 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-8131/</URL>
      <Description>SUSE CVE CVE-2014-8131 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0236/</URL>
      <Description>SUSE CVE CVE-2015-0236 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5247/</URL>
      <Description>SUSE CVE CVE-2015-5247 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5313/</URL>
      <Description>SUSE CVE CVE-2015-5313 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-2.5.0-1.1">
      <FullProductName ProductID="libvirt-2.5.0-1.1">libvirt-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-admin-2.5.0-1.1">
      <FullProductName ProductID="libvirt-admin-2.5.0-1.1">libvirt-admin-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-client-2.5.0-1.1">
      <FullProductName ProductID="libvirt-client-2.5.0-1.1">libvirt-client-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-2.5.0-1.1">
      <FullProductName ProductID="libvirt-daemon-2.5.0-1.1">libvirt-daemon-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-config-network-2.5.0-1.1">
      <FullProductName ProductID="libvirt-daemon-config-network-2.5.0-1.1">libvirt-daemon-config-network-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-config-nwfilter-2.5.0-1.1">
      <FullProductName ProductID="libvirt-daemon-config-nwfilter-2.5.0-1.1">libvirt-daemon-config-nwfilter-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-interface-2.5.0-1.1">
      <FullProductName ProductID="libvirt-daemon-driver-interface-2.5.0-1.1">libvirt-daemon-driver-interface-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-libxl-2.5.0-1.1">
      <FullProductName ProductID="libvirt-daemon-driver-libxl-2.5.0-1.1">libvirt-daemon-driver-libxl-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-lxc-2.5.0-1.1">
      <FullProductName ProductID="libvirt-daemon-driver-lxc-2.5.0-1.1">libvirt-daemon-driver-lxc-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-network-2.5.0-1.1">
      <FullProductName ProductID="libvirt-daemon-driver-network-2.5.0-1.1">libvirt-daemon-driver-network-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-nodedev-2.5.0-1.1">
      <FullProductName ProductID="libvirt-daemon-driver-nodedev-2.5.0-1.1">libvirt-daemon-driver-nodedev-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-nwfilter-2.5.0-1.1">
      <FullProductName ProductID="libvirt-daemon-driver-nwfilter-2.5.0-1.1">libvirt-daemon-driver-nwfilter-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-qemu-2.5.0-1.1">
      <FullProductName ProductID="libvirt-daemon-driver-qemu-2.5.0-1.1">libvirt-daemon-driver-qemu-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-secret-2.5.0-1.1">
      <FullProductName ProductID="libvirt-daemon-driver-secret-2.5.0-1.1">libvirt-daemon-driver-secret-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-storage-2.5.0-1.1">
      <FullProductName ProductID="libvirt-daemon-driver-storage-2.5.0-1.1">libvirt-daemon-driver-storage-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-uml-2.5.0-1.1">
      <FullProductName ProductID="libvirt-daemon-driver-uml-2.5.0-1.1">libvirt-daemon-driver-uml-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-vbox-2.5.0-1.1">
      <FullProductName ProductID="libvirt-daemon-driver-vbox-2.5.0-1.1">libvirt-daemon-driver-vbox-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-lxc-2.5.0-1.1">
      <FullProductName ProductID="libvirt-daemon-lxc-2.5.0-1.1">libvirt-daemon-lxc-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-qemu-2.5.0-1.1">
      <FullProductName ProductID="libvirt-daemon-qemu-2.5.0-1.1">libvirt-daemon-qemu-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-uml-2.5.0-1.1">
      <FullProductName ProductID="libvirt-daemon-uml-2.5.0-1.1">libvirt-daemon-uml-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-vbox-2.5.0-1.1">
      <FullProductName ProductID="libvirt-daemon-vbox-2.5.0-1.1">libvirt-daemon-vbox-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-xen-2.5.0-1.1">
      <FullProductName ProductID="libvirt-daemon-xen-2.5.0-1.1">libvirt-daemon-xen-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-devel-2.5.0-1.1">
      <FullProductName ProductID="libvirt-devel-2.5.0-1.1">libvirt-devel-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-devel-32bit-2.5.0-1.1">
      <FullProductName ProductID="libvirt-devel-32bit-2.5.0-1.1">libvirt-devel-32bit-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-doc-2.5.0-1.1">
      <FullProductName ProductID="libvirt-doc-2.5.0-1.1">libvirt-doc-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-libs-2.5.0-1.1">
      <FullProductName ProductID="libvirt-libs-2.5.0-1.1">libvirt-libs-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-lock-sanlock-2.5.0-1.1">
      <FullProductName ProductID="libvirt-lock-sanlock-2.5.0-1.1">libvirt-lock-sanlock-2.5.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-nss-2.5.0-1.1">
      <FullProductName ProductID="libvirt-nss-2.5.0-1.1">libvirt-nss-2.5.0-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libvirt-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-2.5.0-1.1">libvirt-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-admin-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1">libvirt-admin-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-client-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-client-2.5.0-1.1">libvirt-client-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1">libvirt-daemon-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-config-network-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1">libvirt-daemon-config-network-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-config-nwfilter-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1">libvirt-daemon-config-nwfilter-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-interface-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1">libvirt-daemon-driver-interface-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-libxl-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1">libvirt-daemon-driver-libxl-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-lxc-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1">libvirt-daemon-driver-lxc-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-network-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1">libvirt-daemon-driver-network-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-nodedev-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1">libvirt-daemon-driver-nodedev-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-nwfilter-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1">libvirt-daemon-driver-nwfilter-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-qemu-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1">libvirt-daemon-driver-qemu-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-secret-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1">libvirt-daemon-driver-secret-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-storage-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1">libvirt-daemon-driver-storage-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-uml-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1">libvirt-daemon-driver-uml-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-vbox-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1">libvirt-daemon-driver-vbox-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-lxc-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1">libvirt-daemon-lxc-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-qemu-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1">libvirt-daemon-qemu-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-uml-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1">libvirt-daemon-uml-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-vbox-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1">libvirt-daemon-vbox-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-xen-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1">libvirt-daemon-xen-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-devel-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1">libvirt-devel-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-devel-32bit-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1">libvirt-devel-32bit-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-doc-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1">libvirt-doc-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-libs-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1">libvirt-libs-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-lock-sanlock-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1">libvirt-lock-sanlock-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-nss-2.5.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1">libvirt-nss-2.5.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Red Hat libvirt 0.2.0 through 0.8.2 creates iptables rules with improper mappings of privileged source ports, which allows guest OS users to bypass intended access restrictions by leveraging IP address and source-port values, as demonstrated by copying and deleting an NFS directory tree.</Note>
    </Notes>
    <CVE>CVE-2010-2242</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-2242.html</URL>
        <Description>CVE-2010-2242</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/618155</URL>
        <Description>SUSE Bug 618155</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libvirt.c in the API in Red Hat libvirt 0.8.8 does not properly restrict operations in a read-only connection, which allows remote attackers to cause a denial of service (host OS crash) or possibly execute arbitrary code via a (1) virNodeDeviceDettach, (2) virNodeDeviceReset, (3) virDomainRevertToSnapshot, (4) virDomainSnapshotDelete, (5) virNodeDeviceReAttach, or (6) virConnectDomainXMLToNative call, a different vulnerability than CVE-2008-5086.</Note>
    </Notes>
    <CVE>CVE-2011-1146</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1146.html</URL>
        <Description>CVE-2011-1146</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/678406</URL>
        <Description>SUSE Bug 678406</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.</Note>
    </Notes>
    <CVE>CVE-2011-2511</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-2511.html</URL>
        <Description>CVE-2011-2511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/703084</URL>
        <Description>SUSE Bug 703084</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The networkReloadIptablesRules function in network/bridge_driver.c in libvirt before 0.9.9 does not properly handle firewall rules on bridge networks when libvirtd is restarted, which might allow remote attackers to bypass intended access restrictions via a (1) DNS or (2) DHCP query.</Note>
    </Notes>
    <CVE>CVE-2011-4600</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-4600.html</URL>
        <Description>CVE-2011-4600</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/736082</URL>
        <Description>SUSE Bug 736082</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The virTypedParameterArrayClear function in libvirt 0.9.13 does not properly handle virDomain* API calls with typed parameters, which might allow remote authenticated users to cause a denial of service (libvirtd crash) via an RPC command with nparams set to zero, which triggers an out-of-bounds read or a free of an invalid pointer.</Note>
    </Notes>
    <CVE>CVE-2012-3445</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-3445.html</URL>
        <Description>CVE-2012-3445</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/773955</URL>
        <Description>SUSE Bug 773955</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the virNetMessageFree function in rpc/virnetserverclient.c in libvirt 1.0.x before 1.0.2, 0.10.2 before 0.10.2.3, 0.9.11 before 0.9.11.9, and 0.9.6 before 0.9.6.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering certain errors during an RPC connection, which causes a message to be freed without being removed from the message queue.</Note>
    </Notes>
    <CVE>CVE-2013-0170</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-0170.html</URL>
        <Description>CVE-2013-0170</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/800976</URL>
        <Description>SUSE Bug 800976</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The remoteDispatchStoragePoolListAllVolumes function in the storage pool manager in libvirt 1.0.5 allows remote attackers to cause a denial of service (file descriptor consumption) via a large number of requests "to list all volumes for the particular pool."</Note>
    </Notes>
    <CVE>CVE-2013-1962</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1962.html</URL>
        <Description>CVE-2013-1962</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/820397</URL>
        <Description>SUSE Bug 820397</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in the virConnectListAllInterfaces method in interface/interface_backend_netcf.c in libvirt 1.0.6 allows remote attackers to cause a denial of service (libvirtd crash) via a filtering flag that causes an interface to be skipped, as demonstrated by the "virsh iface-list --inactive" command.</Note>
    </Notes>
    <CVE>CVE-2013-2218</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:P/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2218.html</URL>
        <Description>CVE-2013-2218</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/827741</URL>
        <Description>SUSE Bug 827741</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The qemu driver (qemu/qemu_driver.c) in libvirt before 1.1.1 allows remote authenticated users to cause a denial of service (daemon crash) via unspecified vectors involving "multiple events registration."</Note>
    </Notes>
    <CVE>CVE-2013-2230</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2230.html</URL>
        <Description>CVE-2013-2230</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/827801</URL>
        <Description>SUSE Bug 827801</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in the qemuAgentGetVCPUs function in qemu/qemu_agent.c in libvirt 1.0.6 through 1.1.0 allows remote attackers to cause a denial of service (daemon crash) via a cpu count request, as demonstrated by the "virsh vcpucount dom --guest" command.</Note>
    </Notes>
    <CVE>CVE-2013-4153</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4153.html</URL>
        <Description>CVE-2013-4153</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/830497</URL>
        <Description>SUSE Bug 830497</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/830498</URL>
        <Description>SUSE Bug 830498</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The qemuAgentCommand function in libvirt before 1.1.1, when a guest agent is not configured, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to "agent based cpu (un)plug," as demonstrated by the "virsh vcpucount foobar --guest" command.</Note>
    </Notes>
    <CVE>CVE-2013-4154</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4154.html</URL>
        <Description>CVE-2013-4154</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/830498</URL>
        <Description>SUSE Bug 830498</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xenDaemonListDefinedDomains function in xen/xend_internal.c in libvirt 1.1.1 allows remote authenticated users to cause a denial of service (memory corruption and crash) via vectors involving the virConnectListDefinedDomains API function.</Note>
    </Notes>
    <CVE>CVE-2013-4239</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4239.html</URL>
        <Description>CVE-2013-4239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/834598</URL>
        <Description>SUSE Bug 834598</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The remoteDispatchDomainMemoryStats function in daemon/remote.c in libvirt 0.9.1 through 0.10.1.x, 0.10.2.x before 0.10.2.8, 1.0.x before 1.0.5.6, and 1.1.x before 1.1.2 allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via a crafted RPC call.</Note>
    </Notes>
    <CVE>CVE-2013-4296</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4296.html</URL>
        <Description>CVE-2013-4296</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/836931</URL>
        <Description>SUSE Bug 836931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/838638</URL>
        <Description>SUSE Bug 838638</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The virFileNBDDeviceAssociate function in util/virfile.c in libvirt 1.1.2 and earlier allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2013-4297</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4297.html</URL>
        <Description>CVE-2013-4297</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/838642</URL>
        <Description>SUSE Bug 838642</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libvirt 1.0.5.x before 1.0.5.6, 0.10.2.x before 0.10.2.8, and 0.9.12.x before 0.9.12.2 allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition in pkcheck via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.</Note>
    </Notes>
    <CVE>CVE-2013-4311</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4311.html</URL>
        <Description>CVE-2013-4311</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/836931</URL>
        <Description>SUSE Bug 836931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/838638</URL>
        <Description>SUSE Bug 838638</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864716</URL>
        <Description>SUSE Bug 864716</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The remoteClientFreeFunc function in daemon/remote.c in libvirt before 1.1.3, when ACLs are used, does not set an identity, which causes event handler removal to be denied and remote attackers to cause a denial of service (use-after-free and crash) by registering an event handler and then closing the connection.</Note>
    </Notes>
    <CVE>CVE-2013-4399</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4399.html</URL>
        <Description>CVE-2013-4399</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/842300</URL>
        <Description>SUSE Bug 842300</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/844052</URL>
        <Description>SUSE Bug 844052</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">virt-login-shell in libvirt 1.1.2 through 1.1.3 allows local users to overwrite arbitrary files and possibly gain privileges via unspecified environment variables or command-line arguments.</Note>
    </Notes>
    <CVE>CVE-2013-4400</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4400.html</URL>
        <Description>CVE-2013-4400</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/837609</URL>
        <Description>SUSE Bug 837609</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The virConnectDomainXMLToNative API function in libvirt 1.1.0 through 1.1.3 checks for the connect:read permission instead of the connect:write permission, which allows attackers to gain domain:write privileges and execute Qemu binaries via crafted XML. NOTE: some of these details are obtained from third party information.</Note>
    </Notes>
    <CVE>CVE-2013-4401</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>8.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4401.html</URL>
        <Description>CVE-2013-4401</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/845704</URL>
        <Description>SUSE Bug 845704</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The lxcDomainGetMemoryParameters method in lxc/lxc_driver.c in libvirt 1.0.5 through 1.2.0 does not properly check the status of LXC guests when reading memory tunables, which allows local users to cause a denial of service (NULL pointer dereference and libvirtd crash) via a guest in the shutdown status, as demonstrated by the "virsh memtune" command.</Note>
    </Notes>
    <CVE>CVE-2013-6436</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-6436.html</URL>
        <Description>CVE-2013-6436</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/854486</URL>
        <Description>SUSE Bug 854486</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The LXC driver (lxc/lxc_driver.c) in libvirt 1.0.1 through 1.2.1 allows local users to (1) delete arbitrary host devices via the virDomainDeviceDettach API and a symlink attack on /dev in the container; (2) create arbitrary nodes (mknod) via the virDomainDeviceAttach API and a symlink attack on /dev in the container; and cause a denial of service (shutdown or reboot host OS) via the (3) virDomainShutdown or (4) virDomainReboot API and a symlink attack on /dev/initctl in the container, related to "paths under /proc/$PID/root" and the virInitctlSetRunLevel function.</Note>
    </Notes>
    <CVE>CVE-2013-6456</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-6456.html</URL>
        <Description>CVE-2013-6456</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/857490</URL>
        <Description>SUSE Bug 857490</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/868943</URL>
        <Description>SUSE Bug 868943</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The libxlDomainGetNumaParameters function in the libxl driver (libxl/libxl_driver.c) in libvirt before 1.2.1 does not properly initialize the nodemap, which allows local users to cause a denial of service (invalid free operation and crash) or possibly execute arbitrary code via an inactive domain to the virsh numatune command.</Note>
    </Notes>
    <CVE>CVE-2013-6457</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.2</BaseScore>
        <Vector>AV:A/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-6457.html</URL>
        <Description>CVE-2013-6457</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/858824</URL>
        <Description>SUSE Bug 858824</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple race conditions in the (1) virDomainBlockStats, (2) virDomainGetBlockInf, (3) qemuDomainBlockJobImpl, and (4) virDomainGetBlockIoTune functions in libvirt before 1.2.1 do not properly verify that the disk is attached, which allows remote read-only attackers to cause a denial of service (libvirtd crash) via the virDomainDetachDeviceFlags command.</Note>
    </Notes>
    <CVE>CVE-2013-6458</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:A/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-6458.html</URL>
        <Description>CVE-2013-6458</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/857492</URL>
        <Description>SUSE Bug 857492</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libvirt 1.1.1 through 1.2.0 allows context-dependent attackers to bypass the domain:getattr and connect:search_domains restrictions in ACLs and obtain sensitive domain object information via a request to the (1) virConnectDomainEventRegister and (2) virConnectDomainEventRegisterAny functions in the event registration API.</Note>
    </Notes>
    <CVE>CVE-2014-0028</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0028.html</URL>
        <Description>CVE-2014-0028</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/859051</URL>
        <Description>SUSE Bug 859051</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libvirt 0.7.5 through 1.2.x before 1.2.5 allows local users to cause a denial of service (read block and hang) via a crafted XML document containing an XML external entity declaration in conjunction with an entity reference to the (1) virConnectCompareCPU or (2) virConnectBaselineCPU API method, related to an XML External Entity (XXE) issue. NOTE: this issue was SPLIT per ADT3 due to different affected versions of some vectors. CVE-2014-5177 is used for other API methods.</Note>
    </Notes>
    <CVE>CVE-2014-0179</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0179.html</URL>
        <Description>CVE-2014-0179</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/873705</URL>
        <Description>SUSE Bug 873705</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the virNetServerClientStartKeepAlive function in libvirt before 1.2.1 allows remote attackers to cause a denial of service (libvirtd crash) by closing a connection before a keepalive response is sent.</Note>
    </Notes>
    <CVE>CVE-2014-1447</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-1447.html</URL>
        <Description>CVE-2014-1447</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/858817</URL>
        <Description>SUSE Bug 858817</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The qemuDomainGetBlockIoTune function in qemu/qemu_driver.c in libvirt before 1.2.9, when a disk has been hot-plugged or removed from the live image, allows remote attackers to cause a denial of service (crash) or read sensitive heap information via a crafted blkiotune query, which triggers an out-of-bounds read.</Note>
    </Notes>
    <CVE>CVE-2014-3633</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3633.html</URL>
        <Description>CVE-2014-3633</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/897783</URL>
        <Description>SUSE Bug 897783</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The virDomainListPopulate function in conf/domain_conf.c in libvirt before 1.2.9 does not clean up the lock on the list of domains, which allows remote attackers to cause a denial of service (deadlock) via a NULL value in the second parameter in the virConnectListAllDomains API command.</Note>
    </Notes>
    <CVE>CVE-2014-3657</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3657.html</URL>
        <Description>CVE-2014-3657</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/897783</URL>
        <Description>SUSE Bug 897783</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/899484</URL>
        <Description>SUSE Bug 899484</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The virDomainGetXMLDesc API in Libvirt before 1.2.11 allows remote read-only users to obtain the VNC password by using the VIR_DOMAIN_XML_MIGRATABLE flag, which triggers the use of the VIR_DOMAIN_XML_SECURE flag.</Note>
    </Notes>
    <CVE>CVE-2014-7823</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-7823.html</URL>
        <Description>CVE-2014-7823</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/904176</URL>
        <Description>SUSE Bug 904176</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The qemu implementation of virConnectGetAllDomainStats in libvirt before 1.2.11 does not properly handle locks when a domain is skipped due to ACL restrictions, which allows a remote authenticated users to cause a denial of service (deadlock or segmentation fault and crash) via a request to access the users does not have privileges to access.</Note>
    </Notes>
    <CVE>CVE-2014-8131</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8131.html</URL>
        <Description>CVE-2014-8131</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/909274</URL>
        <Description>SUSE Bug 909274</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libvirt before 1.2.12 allow remote authenticated users to obtain the VNC password by using the VIR_DOMAIN_XML_SECURE flag with a crafted (1) snapshot to the virDomainSnapshotGetXMLDesc interface or (2) image to the virDomainSaveImageGetXMLDesc interface.</Note>
    </Notes>
    <CVE>CVE-2015-0236</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:L/AC:L/Au:M/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0236.html</URL>
        <Description>CVE-2015-0236</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/914693</URL>
        <Description>SUSE Bug 914693</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The virStorageVolCreateXML API in libvirt 1.2.14 through 1.2.19 allows remote authenticated users with a read-write connection to cause a denial of service (libvirtd crash) by triggering a failed unlink after creating a volume on a root_squash NFS pool.</Note>
    </Notes>
    <CVE>CVE-2015-5247</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5247.html</URL>
        <Description>CVE-2015-5247</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/945645</URL>
        <Description>SUSE Bug 945645</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Directory traversal vulnerability in the virStorageBackendFileSystemVolCreate function in storage/storage_backend_fs.c in libvirt, when fine-grained Access Control Lists (ACL) are in effect, allows local users with storage_vol:create ACL but not domain:write permission to write to arbitrary files via a .. (dot dot) in a volume name.</Note>
    </Notes>
    <CVE>CVE-2015-5313</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-admin-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-uml-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-vbox-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-2.5.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-2.5.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5313.html</URL>
        <Description>CVE-2015-5313</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/953110</URL>
        <Description>SUSE Bug 953110</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
