<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">qemu-2.6.1-1.5 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10233</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">qemu-2.6.1-1.5 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the qemu-2.6.1-1.5 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10233</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10233</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-0928/</URL>
      <Description>SUSE CVE CVE-2008-0928 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-1945/</URL>
      <Description>SUSE CVE CVE-2008-1945 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-2382/</URL>
      <Description>SUSE CVE CVE-2008-2382 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-4539/</URL>
      <Description>SUSE CVE CVE-2008-4539 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-3515/</URL>
      <Description>SUSE CVE CVE-2012-3515 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4148/</URL>
      <Description>SUSE CVE CVE-2013-4148 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4149/</URL>
      <Description>SUSE CVE CVE-2013-4149 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4150/</URL>
      <Description>SUSE CVE CVE-2013-4150 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4151/</URL>
      <Description>SUSE CVE CVE-2013-4151 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4526/</URL>
      <Description>SUSE CVE CVE-2013-4526 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4527/</URL>
      <Description>SUSE CVE CVE-2013-4527 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4529/</URL>
      <Description>SUSE CVE CVE-2013-4529 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4530/</URL>
      <Description>SUSE CVE CVE-2013-4530 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4531/</URL>
      <Description>SUSE CVE CVE-2013-4531 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4533/</URL>
      <Description>SUSE CVE CVE-2013-4533 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4534/</URL>
      <Description>SUSE CVE CVE-2013-4534 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4535/</URL>
      <Description>SUSE CVE CVE-2013-4535 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4536/</URL>
      <Description>SUSE CVE CVE-2013-4536 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4537/</URL>
      <Description>SUSE CVE CVE-2013-4537 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4538/</URL>
      <Description>SUSE CVE CVE-2013-4538 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4539/</URL>
      <Description>SUSE CVE CVE-2013-4539 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4540/</URL>
      <Description>SUSE CVE CVE-2013-4540 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4541/</URL>
      <Description>SUSE CVE CVE-2013-4541 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4542/</URL>
      <Description>SUSE CVE CVE-2013-4542 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4544/</URL>
      <Description>SUSE CVE CVE-2013-4544 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-6399/</URL>
      <Description>SUSE CVE CVE-2013-6399 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0142/</URL>
      <Description>SUSE CVE CVE-2014-0142 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0143/</URL>
      <Description>SUSE CVE CVE-2014-0143 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0144/</URL>
      <Description>SUSE CVE CVE-2014-0144 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0145/</URL>
      <Description>SUSE CVE CVE-2014-0145 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0146/</URL>
      <Description>SUSE CVE CVE-2014-0146 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0147/</URL>
      <Description>SUSE CVE CVE-2014-0147 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0150/</URL>
      <Description>SUSE CVE CVE-2014-0150 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0182/</URL>
      <Description>SUSE CVE CVE-2014-0182 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3456/</URL>
      <Description>SUSE CVE CVE-2015-3456 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3712/</URL>
      <Description>SUSE CVE CVE-2016-3712 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4002/</URL>
      <Description>SUSE CVE CVE-2016-4002 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4020/</URL>
      <Description>SUSE CVE CVE-2016-4020 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4439/</URL>
      <Description>SUSE CVE CVE-2016-4439 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4441/</URL>
      <Description>SUSE CVE CVE-2016-4441 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4453/</URL>
      <Description>SUSE CVE CVE-2016-4453 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4454/</URL>
      <Description>SUSE CVE CVE-2016-4454 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4952/</URL>
      <Description>SUSE CVE CVE-2016-4952 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4964/</URL>
      <Description>SUSE CVE CVE-2016-4964 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5105/</URL>
      <Description>SUSE CVE CVE-2016-5105 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5106/</URL>
      <Description>SUSE CVE CVE-2016-5106 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5107/</URL>
      <Description>SUSE CVE CVE-2016-5107 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5126/</URL>
      <Description>SUSE CVE CVE-2016-5126 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5238/</URL>
      <Description>SUSE CVE CVE-2016-5238 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5337/</URL>
      <Description>SUSE CVE CVE-2016-5337 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5338/</URL>
      <Description>SUSE CVE CVE-2016-5338 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5403/</URL>
      <Description>SUSE CVE CVE-2016-5403 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6351/</URL>
      <Description>SUSE CVE CVE-2016-6351 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="qemu-2.6.1-1.5">
      <FullProductName ProductID="qemu-2.6.1-1.5">qemu-2.6.1-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-arm-2.6.1-1.5">
      <FullProductName ProductID="qemu-arm-2.6.1-1.5">qemu-arm-2.6.1-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-curl-2.6.1-1.5">
      <FullProductName ProductID="qemu-block-curl-2.6.1-1.5">qemu-block-curl-2.6.1-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-dmg-2.6.1-1.5">
      <FullProductName ProductID="qemu-block-dmg-2.6.1-1.5">qemu-block-dmg-2.6.1-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-gluster-2.6.1-1.5">
      <FullProductName ProductID="qemu-block-gluster-2.6.1-1.5">qemu-block-gluster-2.6.1-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-iscsi-2.6.1-1.5">
      <FullProductName ProductID="qemu-block-iscsi-2.6.1-1.5">qemu-block-iscsi-2.6.1-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-ssh-2.6.1-1.5">
      <FullProductName ProductID="qemu-block-ssh-2.6.1-1.5">qemu-block-ssh-2.6.1-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-extra-2.6.1-1.5">
      <FullProductName ProductID="qemu-extra-2.6.1-1.5">qemu-extra-2.6.1-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-guest-agent-2.6.1-1.5">
      <FullProductName ProductID="qemu-guest-agent-2.6.1-1.5">qemu-guest-agent-2.6.1-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ipxe-1.0.0-1.5">
      <FullProductName ProductID="qemu-ipxe-1.0.0-1.5">qemu-ipxe-1.0.0-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ksm-2.6.1-1.5">
      <FullProductName ProductID="qemu-ksm-2.6.1-1.5">qemu-ksm-2.6.1-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-kvm-2.6.1-1.5">
      <FullProductName ProductID="qemu-kvm-2.6.1-1.5">qemu-kvm-2.6.1-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-lang-2.6.1-1.5">
      <FullProductName ProductID="qemu-lang-2.6.1-1.5">qemu-lang-2.6.1-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ppc-2.6.1-1.5">
      <FullProductName ProductID="qemu-ppc-2.6.1-1.5">qemu-ppc-2.6.1-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-s390-2.6.1-1.5">
      <FullProductName ProductID="qemu-s390-2.6.1-1.5">qemu-s390-2.6.1-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-seabios-1.9.1-1.5">
      <FullProductName ProductID="qemu-seabios-1.9.1-1.5">qemu-seabios-1.9.1-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-sgabios-8-1.5">
      <FullProductName ProductID="qemu-sgabios-8-1.5">qemu-sgabios-8-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-testsuite-2.6.1-1.5">
      <FullProductName ProductID="qemu-testsuite-2.6.1-1.5">qemu-testsuite-2.6.1-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-tools-2.6.1-1.5">
      <FullProductName ProductID="qemu-tools-2.6.1-1.5">qemu-tools-2.6.1-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-vgabios-1.9.1-1.5">
      <FullProductName ProductID="qemu-vgabios-1.9.1-1.5">qemu-vgabios-1.9.1-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-x86-2.6.1-1.5">
      <FullProductName ProductID="qemu-x86-2.6.1-1.5">qemu-x86-2.6.1-1.5</FullProductName>
    </Branch>
    <Relationship ProductReference="qemu-2.6.1-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-2.6.1-1.5">qemu-2.6.1-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-arm-2.6.1-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-arm-2.6.1-1.5">qemu-arm-2.6.1-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-curl-2.6.1-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5">qemu-block-curl-2.6.1-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-dmg-2.6.1-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5">qemu-block-dmg-2.6.1-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-gluster-2.6.1-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5">qemu-block-gluster-2.6.1-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-iscsi-2.6.1-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5">qemu-block-iscsi-2.6.1-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-ssh-2.6.1-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5">qemu-block-ssh-2.6.1-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-extra-2.6.1-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-extra-2.6.1-1.5">qemu-extra-2.6.1-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-guest-agent-2.6.1-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5">qemu-guest-agent-2.6.1-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ipxe-1.0.0-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5">qemu-ipxe-1.0.0-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ksm-2.6.1-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5">qemu-ksm-2.6.1-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-kvm-2.6.1-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5">qemu-kvm-2.6.1-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-lang-2.6.1-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-lang-2.6.1-1.5">qemu-lang-2.6.1-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ppc-2.6.1-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5">qemu-ppc-2.6.1-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-s390-2.6.1-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-s390-2.6.1-1.5">qemu-s390-2.6.1-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-seabios-1.9.1-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5">qemu-seabios-1.9.1-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-sgabios-8-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-sgabios-8-1.5">qemu-sgabios-8-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-testsuite-2.6.1-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5">qemu-testsuite-2.6.1-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-tools-2.6.1-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-tools-2.6.1-1.5">qemu-tools-2.6.1-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-vgabios-1.9.1-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5">qemu-vgabios-1.9.1-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-x86-2.6.1-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-x86-2.6.1-1.5">qemu-x86-2.6.1-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine.</Note>
    </Notes>
    <CVE>CVE-2008-0928</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-0928.html</URL>
        <Description>CVE-2008-0928</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/362956</URL>
        <Description>SUSE Bug 362956</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">QEMU 0.9.0 does not properly handle changes to removable media, which allows guest OS users to read arbitrary files on the host OS by using the diskformat: parameter in the -usbdevice option to modify the disk-image header to identify a different format, a related issue to CVE-2008-2004.</Note>
    </Notes>
    <CVE>CVE-2008-1945</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-1945.html</URL>
        <Description>CVE-2008-1945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/362956</URL>
        <Description>SUSE Bug 362956</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The protocol_client_msg function in vnc.c in the VNC server in (1) Qemu 0.9.1 and earlier and (2) KVM kvm-79 and earlier allows remote attackers to cause a denial of service (infinite loop) via a certain message.</Note>
    </Notes>
    <CVE>CVE-2008-2382</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-2382.html</URL>
        <Description>CVE-2008-2382</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/461565</URL>
        <Description>SUSE Bug 461565</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/464142</URL>
        <Description>SUSE Bug 464142</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the Cirrus VGA implementation in (1) KVM before kvm-82 and (2) QEMU on Debian GNU/Linux and Ubuntu might allow local users to gain privileges by using the VNC console for a connection, aka the LGD-54XX "bitblt" heap overflow.  NOTE: this issue exists because of an incorrect fix for CVE-2007-1320.</Note>
    </Notes>
    <CVE>CVE-2008-4539</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-4539.html</URL>
        <Description>CVE-2008-4539</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/435135</URL>
        <Description>SUSE Bug 435135</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/448551</URL>
        <Description>SUSE Bug 448551</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."</Note>
    </Notes>
    <CVE>CVE-2012-3515</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-3515.html</URL>
        <Description>CVE-2012-3515</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/777084</URL>
        <Description>SUSE Bug 777084</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer signedness error in the virtio_net_load function in hw/net/virtio-net.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers a buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2013-4148</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:A/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4148.html</URL>
        <Description>CVE-2013-4148</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864812</URL>
        <Description>SUSE Bug 864812</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/964630</URL>
        <Description>SUSE Bug 964630</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in virtio_net_load function in net/virtio-net.c in QEMU 1.3.0 through 1.7.x before 1.7.2 might allow remote attackers to execute arbitrary code via a large MAC table.</Note>
    </Notes>
    <CVE>CVE-2013-4149</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4149.html</URL>
        <Description>CVE-2013-4149</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864649</URL>
        <Description>SUSE Bug 864649</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/964443</URL>
        <Description>SUSE Bug 964443</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The virtio_net_load function in hw/net/virtio-net.c in QEMU 1.5.0 through 1.7.x before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via vectors in which the value of curr_queues is greater than max_queues, which triggers an out-of-bounds write.</Note>
    </Notes>
    <CVE>CVE-2013-4150</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4150.html</URL>
        <Description>CVE-2013-4150</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864650</URL>
        <Description>SUSE Bug 864650</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The virtio_load function in virtio/virtio.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds write.</Note>
    </Notes>
    <CVE>CVE-2013-4151</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:A/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4151.html</URL>
        <Description>CVE-2013-4151</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864653</URL>
        <Description>SUSE Bug 864653</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/964636</URL>
        <Description>SUSE Bug 964636</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in hw/ide/ahci.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via vectors related to migrating ports.</Note>
    </Notes>
    <CVE>CVE-2013-4526</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4526.html</URL>
        <Description>CVE-2013-4526</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864671</URL>
        <Description>SUSE Bug 864671</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in hw/timer/hpet.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via vectors related to the number of timers.</Note>
    </Notes>
    <CVE>CVE-2013-4527</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.2</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4527.html</URL>
        <Description>CVE-2013-4527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864673</URL>
        <Description>SUSE Bug 864673</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/964746</URL>
        <Description>SUSE Bug 964746</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in hw/pci/pcie_aer.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large log_num value in a savevm image.</Note>
    </Notes>
    <CVE>CVE-2013-4529</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.3</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4529.html</URL>
        <Description>CVE-2013-4529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864678</URL>
        <Description>SUSE Bug 864678</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/964929</URL>
        <Description>SUSE Bug 964929</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in hw/ssi/pl022.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted tx_fifo_head and rx_fifo_head values in a savevm image.</Note>
    </Notes>
    <CVE>CVE-2013-4530</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4530.html</URL>
        <Description>CVE-2013-4530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1072198</URL>
        <Description>SUSE Bug 1072198</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1072223</URL>
        <Description>SUSE Bug 1072223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1072228</URL>
        <Description>SUSE Bug 1072228</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864682</URL>
        <Description>SUSE Bug 864682</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/964950</URL>
        <Description>SUSE Bug 964950</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in target-arm/machine.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a negative value in cpreg_vmstate_array_len in a savevm image.</Note>
    </Notes>
    <CVE>CVE-2013-4531</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4531.html</URL>
        <Description>CVE-2013-4531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864796</URL>
        <Description>SUSE Bug 864796</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s-&gt;rx_level value in a savevm image.</Note>
    </Notes>
    <CVE>CVE-2013-4533</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4533.html</URL>
        <Description>CVE-2013-4533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1072223</URL>
        <Description>SUSE Bug 1072223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864655</URL>
        <Description>SUSE Bug 864655</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/964644</URL>
        <Description>SUSE Bug 964644</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in hw/intc/openpic.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements.</Note>
    </Notes>
    <CVE>CVE-2013-4534</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4534.html</URL>
        <Description>CVE-2013-4534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864811</URL>
        <Description>SUSE Bug 864811</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/964452</URL>
        <Description>SUSE Bug 964452</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The virtqueue_map_sg function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary files via a crafted savevm image, related to virtio-block or virtio-serial read.</Note>
    </Notes>
    <CVE>CVE-2013-4535</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:A/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4535.html</URL>
        <Description>CVE-2013-4535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864665</URL>
        <Description>SUSE Bug 864665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/964676</URL>
        <Description>SUSE Bug 964676</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An user able to alter the savevm data (either on the disk or over the wire during migration) could use this flaw to to corrupt QEMU process memory on the (destination) host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.</Note>
    </Notes>
    <CVE>CVE-2013-4536</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4536.html</URL>
        <Description>CVE-2013-4536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864665</URL>
        <Description>SUSE Bug 864665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/964676</URL>
        <Description>SUSE Bug 964676</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ssi_sd_transfer function in hw/sd/ssi-sd.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary code via a crafted arglen value in a savevm image.</Note>
    </Notes>
    <CVE>CVE-2013-4537</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4537.html</URL>
        <Description>CVE-2013-4537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864391</URL>
        <Description>SUSE Bug 864391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962642</URL>
        <Description>SUSE Bug 962642</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c in QEMU before 1.7.2 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image.</Note>
    </Notes>
    <CVE>CVE-2013-4538</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4538.html</URL>
        <Description>CVE-2013-4538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1072223</URL>
        <Description>SUSE Bug 1072223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864769</URL>
        <Description>SUSE Bug 864769</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962335</URL>
        <Description>SUSE Bug 962335</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image.</Note>
    </Notes>
    <CVE>CVE-2013-4539</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4539.html</URL>
        <Description>CVE-2013-4539</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1072223</URL>
        <Description>SUSE Bug 1072223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864805</URL>
        <Description>SUSE Bug 864805</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962758</URL>
        <Description>SUSE Bug 962758</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in scoop_gpio_handler_update in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a large (1) prev_level, (2) gpio_level, or (3) gpio_dir value in a savevm image.</Note>
    </Notes>
    <CVE>CVE-2013-4540</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4540.html</URL>
        <Description>CVE-2013-4540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864801</URL>
        <Description>SUSE Bug 864801</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/880751</URL>
        <Description>SUSE Bug 880751</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The usb_device_post_load function in hw/usb/bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, related to a negative setup_len or setup_index value.</Note>
    </Notes>
    <CVE>CVE-2013-4541</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4541.html</URL>
        <Description>CVE-2013-4541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864802</URL>
        <Description>SUSE Bug 864802</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The virtio_scsi_load_request function in hw/scsi/scsi-bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds array access.</Note>
    </Notes>
    <CVE>CVE-2013-4542</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4542.html</URL>
        <Description>CVE-2013-4542</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864804</URL>
        <Description>SUSE Bug 864804</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">hw/net/vmxnet3.c in QEMU 2.0.0-rc0, 1.7.1, and earlier allows local guest users to cause a denial of service or possibly execute arbitrary code via vectors related to (1) RX or (2) TX queue numbers or (3) interrupt indices. NOTE: some of these details are obtained from third party information.</Note>
    </Notes>
    <CVE>CVE-2013-4544</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4544.html</URL>
        <Description>CVE-2013-4544</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/873613</URL>
        <Description>SUSE Bug 873613</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Array index error in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image.</Note>
    </Notes>
    <CVE>CVE-2013-6399</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:A/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-6399.html</URL>
        <Description>CVE-2013-6399</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864814</URL>
        <Description>SUSE Bug 864814</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/964643</URL>
        <Description>SUSE Bug 964643</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">QEMU, possibly before 2.0.0, allows local users to cause a denial of service (divide-by-zero error and crash) via a zero value in the (1) tracks field to the seek_to_sector function in block/parallels.c or (2) extent_size field in the bochs function in block/bochs.c.</Note>
    </Notes>
    <CVE>CVE-2014-0142</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0142.html</URL>
        <Description>CVE-2014-0142</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/870439</URL>
        <Description>SUSE Bug 870439</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-snapshot.c or (4) qcow2_grow_l1_table function in qcow2-cluster.c, (5) a large request in the bdrv_check_byte_request function in block.c and other block drivers, (6) crafted cluster indexes in the get_refcount function in qcow2-refcount.c, or (7) a large number of blocks in the cloop_open function in cloop.c, which trigger buffer overflows, memory corruption, large memory allocations and out-of-bounds read and writes.</Note>
    </Notes>
    <CVE>CVE-2014-0143</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0143.html</URL>
        <Description>CVE-2014-0143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/870439</URL>
        <Description>SUSE Bug 870439</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.</Note>
    </Notes>
    <CVE>CVE-2014-0144</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0144.html</URL>
        <Description>CVE-2014-0144</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/870439</URL>
        <Description>SUSE Bug 870439</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple buffer overflows in QEMU before 1.7.2 and 2.x before 2.0.0, allow local users to cause a denial of service (crash) or possibly execute arbitrary code via a large (1) L1 table in the qcow2_snapshot_load_tmp in the QCOW 2 block driver (block/qcow2-snapshot.c) or (2) uncompressed chunk, (3) chunk length, or (4) number of sectors in the DMG block driver (block/dmg.c).</Note>
    </Notes>
    <CVE>CVE-2014-0145</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0145.html</URL>
        <Description>CVE-2014-0145</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/870439</URL>
        <Description>SUSE Bug 870439</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The qcow2_open function in the (block/qcow2.c) in QEMU before 1.7.2 and 2.x before 2.0.0 allows local users to cause a denial of service (NULL pointer dereference) via a crafted image which causes an error, related to the initialization of the snapshot_offset and nb_snapshots fields.</Note>
    </Notes>
    <CVE>CVE-2014-0146</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0146.html</URL>
        <Description>CVE-2014-0146</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/870439</URL>
        <Description>SUSE Bug 870439</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.</Note>
    </Notes>
    <CVE>CVE-2014-0147</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0147.html</URL>
        <Description>CVE-2014-0147</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/870439</URL>
        <Description>SUSE Bug 870439</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871442</URL>
        <Description>SUSE Bug 871442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the virtio_net_handle_mac function in hw/net/virtio-net.c in QEMU 2.0 and earlier allows local guest users to execute arbitrary code via a MAC addresses table update request, which triggers a heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2014-0150</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0150.html</URL>
        <Description>CVE-2014-0150</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/873235</URL>
        <Description>SUSE Bug 873235</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted config length in a savevm image.</Note>
    </Notes>
    <CVE>CVE-2014-0182</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:A/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0182.html</URL>
        <Description>CVE-2014-0182</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/874788</URL>
        <Description>SUSE Bug 874788</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/964693</URL>
        <Description>SUSE Bug 964693</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.</Note>
    </Notes>
    <CVE>CVE-2015-3456</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3456.html</URL>
        <Description>CVE-2015-3456</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/929339</URL>
        <Description>SUSE Bug 929339</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932770</URL>
        <Description>SUSE Bug 932770</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935900</URL>
        <Description>SUSE Bug 935900</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.</Note>
    </Notes>
    <CVE>CVE-2016-3712</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3712.html</URL>
        <Description>CVE-2016-3712</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/978160</URL>
        <Description>SUSE Bug 978160</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/978164</URL>
        <Description>SUSE Bug 978164</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/978167</URL>
        <Description>SUSE Bug 978167</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.</Note>
    </Notes>
    <CVE>CVE-2016-4002</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4002.html</URL>
        <Description>CVE-2016-4002</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/975136</URL>
        <Description>SUSE Bug 975136</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/975138</URL>
        <Description>SUSE Bug 975138</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).</Note>
    </Notes>
    <CVE>CVE-2016-4020</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4020.html</URL>
        <Description>CVE-2016-4020</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/975700</URL>
        <Description>SUSE Bug 975700</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/975907</URL>
        <Description>SUSE Bug 975907</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2016-4439</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4439.html</URL>
        <Description>CVE-2016-4439</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980711</URL>
        <Description>SUSE Bug 980711</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980716</URL>
        <Description>SUSE Bug 980716</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command.</Note>
    </Notes>
    <CVE>CVE-2016-4441</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4441.html</URL>
        <Description>CVE-2016-4441</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980723</URL>
        <Description>SUSE Bug 980723</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980724</URL>
        <Description>SUSE Bug 980724</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command.</Note>
    </Notes>
    <CVE>CVE-2016-4453</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.3</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4453.html</URL>
        <Description>CVE-2016-4453</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982223</URL>
        <Description>SUSE Bug 982223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982225</URL>
        <Description>SUSE Bug 982225</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read.</Note>
    </Notes>
    <CVE>CVE-2016-4454</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.8</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4454.html</URL>
        <Description>CVE-2016-4454</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982222</URL>
        <Description>SUSE Bug 982222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982224</URL>
        <Description>SUSE Bug 982224</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">QEMU (aka Quick Emulator), when built with VMWARE PVSCSI paravirtual SCSI bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds array access) via vectors related to the (1) PVSCSI_CMD_SETUP_RINGS or (2) PVSCSI_CMD_SETUP_MSG_RING SCSI command.</Note>
    </Notes>
    <CVE>CVE-2016-4952</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4952.html</URL>
        <Description>CVE-2016-4952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981266</URL>
        <Description>SUSE Bug 981266</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981276</URL>
        <Description>SUSE Bug 981276</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mptsas_fetch_requests function in hw/scsi/mptsas.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop, and CPU consumption or QEMU process crash) via vectors involving s-&gt;state.</Note>
    </Notes>
    <CVE>CVE-2016-4964</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4964.html</URL>
        <Description>CVE-2016-4964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981399</URL>
        <Description>SUSE Bug 981399</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981401</URL>
        <Description>SUSE Bug 981401</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, uses an uninitialized variable, which allows local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command.</Note>
    </Notes>
    <CVE>CVE-2016-5105</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5105.html</URL>
        <Description>CVE-2016-5105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982017</URL>
        <Description>SUSE Bug 982017</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982024</URL>
        <Description>SUSE Bug 982024</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command.</Note>
    </Notes>
    <CVE>CVE-2016-5106</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5106.html</URL>
        <Description>CVE-2016-5106</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982018</URL>
        <Description>SUSE Bug 982018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982025</URL>
        <Description>SUSE Bug 982025</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2016-5107</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5107.html</URL>
        <Description>CVE-2016-5107</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982019</URL>
        <Description>SUSE Bug 982019</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982026</URL>
        <Description>SUSE Bug 982026</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call.</Note>
    </Notes>
    <CVE>CVE-2016-5126</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5126.html</URL>
        <Description>CVE-2016-5126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982285</URL>
        <Description>SUSE Bug 982285</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982286</URL>
        <Description>SUSE Bug 982286</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The get_cmd function in hw/scsi/esp.c in QEMU might allow local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode.</Note>
    </Notes>
    <CVE>CVE-2016-5238</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.1</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5238.html</URL>
        <Description>CVE-2016-5238</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982959</URL>
        <Description>SUSE Bug 982959</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982960</URL>
        <Description>SUSE Bug 982960</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information.</Note>
    </Notes>
    <CVE>CVE-2016-5337</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5337.html</URL>
        <Description>CVE-2016-5337</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983961</URL>
        <Description>SUSE Bug 983961</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983973</URL>
        <Description>SUSE Bug 983973</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer.</Note>
    </Notes>
    <CVE>CVE-2016-5338</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5338.html</URL>
        <Description>CVE-2016-5338</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983982</URL>
        <Description>SUSE Bug 983982</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983984</URL>
        <Description>SUSE Bug 983984</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion.</Note>
    </Notes>
    <CVE>CVE-2016-5403</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.3</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5403.html</URL>
        <Description>CVE-2016-5403</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990923</URL>
        <Description>SUSE Bug 990923</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991080</URL>
        <Description>SUSE Bug 991080</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The esp_do_dma function in hw/scsi/esp.c in QEMU (aka Quick Emulator), when built with ESP/NCR53C9x controller emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the QEMU host via vectors involving DMA read into ESP command buffer.</Note>
    </Notes>
    <CVE>CVE-2016-6351</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-testsuite-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-2.6.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.9.1-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-2.6.1-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:A/AC:H/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6351.html</URL>
        <Description>CVE-2016-6351</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990835</URL>
        <Description>SUSE Bug 990835</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990843</URL>
        <Description>SUSE Bug 990843</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
