<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libvirt-7.7.0-2.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11008</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libvirt-7.7.0-2.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libvirt-7.7.0-2.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11008</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:11008</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-5086/</URL>
      <Description>SUSE CVE CVE-2008-5086 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-1000256/</URL>
      <Description>SUSE CVE CVE-2017-1000256 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2635/</URL>
      <Description>SUSE CVE CVE-2017-2635 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1064/</URL>
      <Description>SUSE CVE CVE-2018-1064 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12126/</URL>
      <Description>SUSE CVE CVE-2018-12126 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12127/</URL>
      <Description>SUSE CVE CVE-2018-12127 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3639/</URL>
      <Description>SUSE CVE CVE-2018-3639 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5748/</URL>
      <Description>SUSE CVE CVE-2018-5748 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10132/</URL>
      <Description>SUSE CVE CVE-2019-10132 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10161/</URL>
      <Description>SUSE CVE CVE-2019-10161 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10166/</URL>
      <Description>SUSE CVE CVE-2019-10166 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10167/</URL>
      <Description>SUSE CVE CVE-2019-10167 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10168/</URL>
      <Description>SUSE CVE CVE-2019-10168 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11135/</URL>
      <Description>SUSE CVE CVE-2019-11135 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3886/</URL>
      <Description>SUSE CVE CVE-2019-3886 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10701/</URL>
      <Description>SUSE CVE CVE-2020-10701 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14339/</URL>
      <Description>SUSE CVE CVE-2020-14339 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15708/</URL>
      <Description>SUSE CVE CVE-2020-15708 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25637/</URL>
      <Description>SUSE CVE CVE-2020-25637 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3631/</URL>
      <Description>SUSE CVE CVE-2021-3631 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3667/</URL>
      <Description>SUSE CVE CVE-2021-3667 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-7.7.0-2.1">
      <FullProductName ProductID="libvirt-7.7.0-2.1">libvirt-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-client-7.7.0-2.1">
      <FullProductName ProductID="libvirt-client-7.7.0-2.1">libvirt-client-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-7.7.0-2.1">
      <FullProductName ProductID="libvirt-daemon-7.7.0-2.1">libvirt-daemon-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-config-network-7.7.0-2.1">
      <FullProductName ProductID="libvirt-daemon-config-network-7.7.0-2.1">libvirt-daemon-config-network-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-config-nwfilter-7.7.0-2.1">
      <FullProductName ProductID="libvirt-daemon-config-nwfilter-7.7.0-2.1">libvirt-daemon-config-nwfilter-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-interface-7.7.0-2.1">
      <FullProductName ProductID="libvirt-daemon-driver-interface-7.7.0-2.1">libvirt-daemon-driver-interface-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-libxl-7.7.0-2.1">
      <FullProductName ProductID="libvirt-daemon-driver-libxl-7.7.0-2.1">libvirt-daemon-driver-libxl-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-lxc-7.7.0-2.1">
      <FullProductName ProductID="libvirt-daemon-driver-lxc-7.7.0-2.1">libvirt-daemon-driver-lxc-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-network-7.7.0-2.1">
      <FullProductName ProductID="libvirt-daemon-driver-network-7.7.0-2.1">libvirt-daemon-driver-network-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-nodedev-7.7.0-2.1">
      <FullProductName ProductID="libvirt-daemon-driver-nodedev-7.7.0-2.1">libvirt-daemon-driver-nodedev-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-nwfilter-7.7.0-2.1">
      <FullProductName ProductID="libvirt-daemon-driver-nwfilter-7.7.0-2.1">libvirt-daemon-driver-nwfilter-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-qemu-7.7.0-2.1">
      <FullProductName ProductID="libvirt-daemon-driver-qemu-7.7.0-2.1">libvirt-daemon-driver-qemu-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-secret-7.7.0-2.1">
      <FullProductName ProductID="libvirt-daemon-driver-secret-7.7.0-2.1">libvirt-daemon-driver-secret-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-storage-7.7.0-2.1">
      <FullProductName ProductID="libvirt-daemon-driver-storage-7.7.0-2.1">libvirt-daemon-driver-storage-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-storage-core-7.7.0-2.1">
      <FullProductName ProductID="libvirt-daemon-driver-storage-core-7.7.0-2.1">libvirt-daemon-driver-storage-core-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-storage-disk-7.7.0-2.1">
      <FullProductName ProductID="libvirt-daemon-driver-storage-disk-7.7.0-2.1">libvirt-daemon-driver-storage-disk-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-storage-gluster-7.7.0-2.1">
      <FullProductName ProductID="libvirt-daemon-driver-storage-gluster-7.7.0-2.1">libvirt-daemon-driver-storage-gluster-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-storage-iscsi-7.7.0-2.1">
      <FullProductName ProductID="libvirt-daemon-driver-storage-iscsi-7.7.0-2.1">libvirt-daemon-driver-storage-iscsi-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1">
      <FullProductName ProductID="libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1">libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-storage-logical-7.7.0-2.1">
      <FullProductName ProductID="libvirt-daemon-driver-storage-logical-7.7.0-2.1">libvirt-daemon-driver-storage-logical-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-storage-mpath-7.7.0-2.1">
      <FullProductName ProductID="libvirt-daemon-driver-storage-mpath-7.7.0-2.1">libvirt-daemon-driver-storage-mpath-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-storage-rbd-7.7.0-2.1">
      <FullProductName ProductID="libvirt-daemon-driver-storage-rbd-7.7.0-2.1">libvirt-daemon-driver-storage-rbd-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-driver-storage-scsi-7.7.0-2.1">
      <FullProductName ProductID="libvirt-daemon-driver-storage-scsi-7.7.0-2.1">libvirt-daemon-driver-storage-scsi-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-hooks-7.7.0-2.1">
      <FullProductName ProductID="libvirt-daemon-hooks-7.7.0-2.1">libvirt-daemon-hooks-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-lxc-7.7.0-2.1">
      <FullProductName ProductID="libvirt-daemon-lxc-7.7.0-2.1">libvirt-daemon-lxc-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-qemu-7.7.0-2.1">
      <FullProductName ProductID="libvirt-daemon-qemu-7.7.0-2.1">libvirt-daemon-qemu-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-daemon-xen-7.7.0-2.1">
      <FullProductName ProductID="libvirt-daemon-xen-7.7.0-2.1">libvirt-daemon-xen-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-devel-7.7.0-2.1">
      <FullProductName ProductID="libvirt-devel-7.7.0-2.1">libvirt-devel-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-devel-32bit-7.7.0-2.1">
      <FullProductName ProductID="libvirt-devel-32bit-7.7.0-2.1">libvirt-devel-32bit-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-doc-7.7.0-2.1">
      <FullProductName ProductID="libvirt-doc-7.7.0-2.1">libvirt-doc-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-libs-7.7.0-2.1">
      <FullProductName ProductID="libvirt-libs-7.7.0-2.1">libvirt-libs-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-lock-sanlock-7.7.0-2.1">
      <FullProductName ProductID="libvirt-lock-sanlock-7.7.0-2.1">libvirt-lock-sanlock-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvirt-nss-7.7.0-2.1">
      <FullProductName ProductID="libvirt-nss-7.7.0-2.1">libvirt-nss-7.7.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="wireshark-plugin-libvirt-7.7.0-2.1">
      <FullProductName ProductID="wireshark-plugin-libvirt-7.7.0-2.1">wireshark-plugin-libvirt-7.7.0-2.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libvirt-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-7.7.0-2.1">libvirt-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-client-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-client-7.7.0-2.1">libvirt-client-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1">libvirt-daemon-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-config-network-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1">libvirt-daemon-config-network-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-config-nwfilter-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1">libvirt-daemon-config-nwfilter-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-interface-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1">libvirt-daemon-driver-interface-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-libxl-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1">libvirt-daemon-driver-libxl-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-lxc-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1">libvirt-daemon-driver-lxc-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-network-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1">libvirt-daemon-driver-network-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-nodedev-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1">libvirt-daemon-driver-nodedev-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-nwfilter-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1">libvirt-daemon-driver-nwfilter-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-qemu-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1">libvirt-daemon-driver-qemu-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-secret-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1">libvirt-daemon-driver-secret-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-storage-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1">libvirt-daemon-driver-storage-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-storage-core-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1">libvirt-daemon-driver-storage-core-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-storage-disk-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1">libvirt-daemon-driver-storage-disk-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-storage-gluster-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1">libvirt-daemon-driver-storage-gluster-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-storage-iscsi-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1">libvirt-daemon-driver-storage-iscsi-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1">libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-storage-logical-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1">libvirt-daemon-driver-storage-logical-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-storage-mpath-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1">libvirt-daemon-driver-storage-mpath-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-storage-rbd-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1">libvirt-daemon-driver-storage-rbd-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-driver-storage-scsi-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1">libvirt-daemon-driver-storage-scsi-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-hooks-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1">libvirt-daemon-hooks-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-lxc-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1">libvirt-daemon-lxc-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-qemu-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1">libvirt-daemon-qemu-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-daemon-xen-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1">libvirt-daemon-xen-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-devel-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1">libvirt-devel-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-devel-32bit-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1">libvirt-devel-32bit-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-doc-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1">libvirt-doc-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-libs-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1">libvirt-libs-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-lock-sanlock-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1">libvirt-lock-sanlock-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvirt-nss-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1">libvirt-nss-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="wireshark-plugin-libvirt-7.7.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1">wireshark-plugin-libvirt-7.7.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple methods in libvirt 0.3.2 through 0.5.1 do not check if a connection is read-only, which allows local users to bypass intended access restrictions and perform administrative actions.</Note>
    </Notes>
    <CVE>CVE-2008-5086</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-5086.html</URL>
        <Description>CVE-2008-5086</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/459009</URL>
        <Description>SUSE Bug 459009</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libvirt version 2.3.0 and later is vulnerable to a bad default configuration of "verify-peer=no" passed to QEMU by libvirt resulting in a failure to validate SSL/TLS certificates by default.</Note>
    </Notes>
    <CVE>CVE-2017-1000256</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-1000256.html</URL>
        <Description>CVE-2017-1000256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1062563</URL>
        <Description>SUSE Bug 1062563</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A NULL pointer deference flaw was found in the way libvirt from 2.5.0 to 3.0.0 handled empty drives. A remote authenticated attacker could use this flaw to crash libvirtd daemon resulting in denial of service.</Note>
    </Notes>
    <CVE>CVE-2017-2635</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2635.html</URL>
        <Description>CVE-2017-2635</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1027075</URL>
        <Description>SUSE Bug 1027075</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libvirt version before 4.2.0-rc1 is vulnerable to a resource exhaustion as a result of an incomplete fix for CVE-2018-5748 that affects QEMU monitor but now also triggered via QEMU guest agent.</Note>
    </Notes>
    <CVE>CVE-2018-1064</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1064.html</URL>
        <Description>CVE-2018-1064</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076500</URL>
        <Description>SUSE Bug 1076500</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083625</URL>
        <Description>SUSE Bug 1083625</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087887</URL>
        <Description>SUSE Bug 1087887</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088147</URL>
        <Description>SUSE Bug 1088147</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf</Note>
    </Notes>
    <CVE>CVE-2018-12126</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12126.html</URL>
        <Description>CVE-2018-12126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103186</URL>
        <Description>SUSE Bug 1103186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111331</URL>
        <Description>SUSE Bug 1111331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132686</URL>
        <Description>SUSE Bug 1132686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135409</URL>
        <Description>SUSE Bug 1135409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135524</URL>
        <Description>SUSE Bug 1135524</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1137916</URL>
        <Description>SUSE Bug 1137916</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138534</URL>
        <Description>SUSE Bug 1138534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141977</URL>
        <Description>SUSE Bug 1141977</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149725</URL>
        <Description>SUSE Bug 1149725</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149726</URL>
        <Description>SUSE Bug 1149726</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149729</URL>
        <Description>SUSE Bug 1149729</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf</Note>
    </Notes>
    <CVE>CVE-2018-12127</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12127.html</URL>
        <Description>CVE-2018-12127</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103186</URL>
        <Description>SUSE Bug 1103186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111331</URL>
        <Description>SUSE Bug 1111331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132686</URL>
        <Description>SUSE Bug 1132686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135409</URL>
        <Description>SUSE Bug 1135409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138534</URL>
        <Description>SUSE Bug 1138534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141977</URL>
        <Description>SUSE Bug 1141977</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.</Note>
    </Notes>
    <CVE>CVE-2018-3639</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3639.html</URL>
        <Description>CVE-2018-3639</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074701</URL>
        <Description>SUSE Bug 1074701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085235</URL>
        <Description>SUSE Bug 1085235</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085308</URL>
        <Description>SUSE Bug 1085308</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087078</URL>
        <Description>SUSE Bug 1087078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092631</URL>
        <Description>SUSE Bug 1092631</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092885</URL>
        <Description>SUSE Bug 1092885</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094912</URL>
        <Description>SUSE Bug 1094912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098813</URL>
        <Description>SUSE Bug 1098813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1100394</URL>
        <Description>SUSE Bug 1100394</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1102640</URL>
        <Description>SUSE Bug 1102640</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105412</URL>
        <Description>SUSE Bug 1105412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111963</URL>
        <Description>SUSE Bug 1111963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172781</URL>
        <Description>SUSE Bug 1172781</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172782</URL>
        <Description>SUSE Bug 1172782</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172783</URL>
        <Description>SUSE Bug 1172783</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173489</URL>
        <Description>SUSE Bug 1173489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215674</URL>
        <Description>SUSE Bug 1215674</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service (memory consumption) via a large QEMU reply.</Note>
    </Notes>
    <CVE>CVE-2018-5748</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5748.html</URL>
        <Description>CVE-2018-5748</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076500</URL>
        <Description>SUSE Bug 1076500</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083625</URL>
        <Description>SUSE Bug 1083625</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087887</URL>
        <Description>SUSE Bug 1087887</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in libvirt &gt;= 4.1.0 in the virtlockd-admin.socket and virtlogd-admin.socket systemd units. A missing SocketMode configuration parameter allows any user on the host to connect using virtlockd-admin-sock or virtlogd-admin-sock and perform administrative tasks against the virtlockd and virtlogd daemons.</Note>
    </Notes>
    <CVE>CVE-2019-10132</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10132.html</URL>
        <Description>CVE-2019-10132</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1134348</URL>
        <Description>SUSE Bug 1134348</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">It was discovered that libvirtd before versions 4.10.1 and 5.4.1 would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process. An attacker with access to the libvirtd socket could use this to probe the existence of arbitrary files, cause denial of service or cause libvirtd to execute arbitrary programs.</Note>
    </Notes>
    <CVE>CVE-2019-10161</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10161.html</URL>
        <Description>CVE-2019-10161</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138301</URL>
        <Description>SUSE Bug 1138301</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">It was discovered that libvirtd, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, would permit readonly clients to use the virDomainManagedSaveDefineXML() API, which would permit them to modify managed save state files. If a managed save had already been created by a privileged user, a local attacker could modify this file such that libvirtd would execute an arbitrary program when the domain was resumed.</Note>
    </Notes>
    <CVE>CVE-2019-10166</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10166.html</URL>
        <Description>CVE-2019-10166</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138302</URL>
        <Description>SUSE Bug 1138302</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The virConnectGetDomainCapabilities() libvirt API, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accepts an "emulatorbin" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.</Note>
    </Notes>
    <CVE>CVE-2019-10167</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10167.html</URL>
        <Description>CVE-2019-10167</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138303</URL>
        <Description>SUSE Bug 1138303</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The virConnectBaselineHypervisorCPU() and virConnectCompareHypervisorCPU() libvirt APIs, 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accept an "emulator" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.</Note>
    </Notes>
    <CVE>CVE-2019-10168</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10168.html</URL>
        <Description>CVE-2019-10168</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138305</URL>
        <Description>SUSE Bug 1138305</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138582</URL>
        <Description>SUSE Bug 1138582</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.</Note>
    </Notes>
    <CVE>CVE-2019-11135</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11135.html</URL>
        <Description>CVE-2019-11135</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1139073</URL>
        <Description>SUSE Bug 1139073</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1152497</URL>
        <Description>SUSE Bug 1152497</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1152505</URL>
        <Description>SUSE Bug 1152505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1152506</URL>
        <Description>SUSE Bug 1152506</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160120</URL>
        <Description>SUSE Bug 1160120</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An incorrect permissions check was discovered in libvirt 4.8.0 and above. The readonly permission was allowed to invoke APIs depending on the guest agent, which could lead to potentially disclosing unintended information or denial of service by causing libvirt to block.</Note>
    </Notes>
    <CVE>CVE-2019-3886</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3886.html</URL>
        <Description>CVE-2019-3886</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131595</URL>
        <Description>SUSE Bug 1131595</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1133150</URL>
        <Description>SUSE Bug 1133150</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138301</URL>
        <Description>SUSE Bug 1138301</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A missing authorization flaw was found in the libvirt API responsible for changing the QEMU agent response timeout. This flaw allows read-only connections to adjust the time that libvirt waits for the QEMU guest agent to respond to agent commands. Depending on the timeout value that is set, this flaw can make guest agent commands fail because the agent cannot respond in time. Unprivileged users with a read-only connection could abuse this flaw to set the response timeout for all guest agent messages to zero, potentially leading to a denial of service. This flaw affects libvirt versions before 6.2.0.</Note>
    </Notes>
    <CVE>CVE-2020-10701</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10701.html</URL>
        <Description>CVE-2020-10701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1168680</URL>
        <Description>SUSE Bug 1168680</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libvirt, where it leaked a file descriptor for `/dev/mapper/control` into the QEMU process. This file descriptor allows for privileged operations to happen against the device-mapper on the host. This flaw allows a malicious guest user or process to perform operations outside of their standard permissions, potentially causing serious damage to the host operating system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2020-14339</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14339.html</URL>
        <Description>CVE-2020-14339</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174458</URL>
        <Description>SUSE Bug 1174458</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Ubuntu's packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.</Note>
    </Notes>
    <CVE>CVE-2020-15708</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15708.html</URL>
        <Description>CVE-2020-15708</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174955</URL>
        <Description>SUSE Bug 1174955</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2020-25637</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25637.html</URL>
        <Description>CVE-2020-25637</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174955</URL>
        <Description>SUSE Bug 1174955</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177155</URL>
        <Description>SUSE Bug 1177155</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libvirt while it generates SELinux MCS category pairs for VMs' dynamic labels. This flaw allows one exploited guest to access files labeled for another guest, resulting in the breaking out of sVirt confinement. The highest threat from this vulnerability is to confidentiality and integrity.</Note>
    </Notes>
    <CVE>CVE-2021-3631</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3631.html</URL>
        <Description>CVE-2021-3631</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1187871</URL>
        <Description>SUSE Bug 1187871</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An improper locking issue was found in the virStoragePoolLookupByTargetPath API of libvirt. It occurs in the storagePoolLookupByTargetPath function where a locked virStoragePoolObj object is not properly released on ACL permission failure. Clients connecting to the read-write socket with limited ACL permissions could use this flaw to acquire the lock and prevent other users from accessing storage pool/volume APIs, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability.</Note>
    </Notes>
    <CVE>CVE-2021-3667</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvirt-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-client-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3667.html</URL>
        <Description>CVE-2021-3667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188843</URL>
        <Description>SUSE Bug 1188843</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
