<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">qemu-6.1.0-32.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11287</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">qemu-6.1.0-32.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the qemu-6.1.0-32.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11287</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:11287</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0222/</URL>
      <Description>SUSE CVE CVE-2014-0222 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-8106/</URL>
      <Description>SUSE CVE CVE-2014-8106 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5225/</URL>
      <Description>SUSE CVE CVE-2015-5225 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-6855/</URL>
      <Description>SUSE CVE CVE-2015-6855 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8504/</URL>
      <Description>SUSE CVE CVE-2015-8504 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8619/</URL>
      <Description>SUSE CVE CVE-2015-8619 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10028/</URL>
      <Description>SUSE CVE CVE-2016-10028 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10155/</URL>
      <Description>SUSE CVE CVE-2016-10155 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-1714/</URL>
      <Description>SUSE CVE CVE-2016-1714 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6490/</URL>
      <Description>SUSE CVE CVE-2016-6490 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6836/</URL>
      <Description>SUSE CVE CVE-2016-6836 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7156/</URL>
      <Description>SUSE CVE CVE-2016-7156 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7157/</URL>
      <Description>SUSE CVE CVE-2016-7157 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7161/</URL>
      <Description>SUSE CVE CVE-2016-7161 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7170/</URL>
      <Description>SUSE CVE CVE-2016-7170 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7421/</URL>
      <Description>SUSE CVE CVE-2016-7421 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7422/</URL>
      <Description>SUSE CVE CVE-2016-7422 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7423/</URL>
      <Description>SUSE CVE CVE-2016-7423 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7466/</URL>
      <Description>SUSE CVE CVE-2016-7466 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7907/</URL>
      <Description>SUSE CVE CVE-2016-7907 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7908/</URL>
      <Description>SUSE CVE CVE-2016-7908 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7909/</URL>
      <Description>SUSE CVE CVE-2016-7909 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7994/</URL>
      <Description>SUSE CVE CVE-2016-7994 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7995/</URL>
      <Description>SUSE CVE CVE-2016-7995 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8576/</URL>
      <Description>SUSE CVE CVE-2016-8576 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8577/</URL>
      <Description>SUSE CVE CVE-2016-8577 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8578/</URL>
      <Description>SUSE CVE CVE-2016-8578 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8667/</URL>
      <Description>SUSE CVE CVE-2016-8667 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8668/</URL>
      <Description>SUSE CVE CVE-2016-8668 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8669/</URL>
      <Description>SUSE CVE CVE-2016-8669 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8909/</URL>
      <Description>SUSE CVE CVE-2016-8909 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8910/</URL>
      <Description>SUSE CVE CVE-2016-8910 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9101/</URL>
      <Description>SUSE CVE CVE-2016-9101 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9102/</URL>
      <Description>SUSE CVE CVE-2016-9102 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9103/</URL>
      <Description>SUSE CVE CVE-2016-9103 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9104/</URL>
      <Description>SUSE CVE CVE-2016-9104 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9105/</URL>
      <Description>SUSE CVE CVE-2016-9105 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9106/</URL>
      <Description>SUSE CVE CVE-2016-9106 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9602/</URL>
      <Description>SUSE CVE CVE-2016-9602 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9907/</URL>
      <Description>SUSE CVE CVE-2016-9907 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9921/</URL>
      <Description>SUSE CVE CVE-2016-9921 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10664/</URL>
      <Description>SUSE CVE CVE-2017-10664 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10806/</URL>
      <Description>SUSE CVE CVE-2017-10806 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-11334/</URL>
      <Description>SUSE CVE CVE-2017-11334 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-11434/</URL>
      <Description>SUSE CVE CVE-2017-11434 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13673/</URL>
      <Description>SUSE CVE CVE-2017-13673 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13711/</URL>
      <Description>SUSE CVE CVE-2017-13711 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-14167/</URL>
      <Description>SUSE CVE CVE-2017-14167 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15038/</URL>
      <Description>SUSE CVE CVE-2017-15038 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15118/</URL>
      <Description>SUSE CVE CVE-2017-15118 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15268/</URL>
      <Description>SUSE CVE CVE-2017-15268 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15289/</URL>
      <Description>SUSE CVE CVE-2017-15289 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2615/</URL>
      <Description>SUSE CVE CVE-2017-2615 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2620/</URL>
      <Description>SUSE CVE CVE-2017-2620 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2630/</URL>
      <Description>SUSE CVE CVE-2017-2630 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5525/</URL>
      <Description>SUSE CVE CVE-2017-5525 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5526/</URL>
      <Description>SUSE CVE CVE-2017-5526 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5552/</URL>
      <Description>SUSE CVE CVE-2017-5552 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5578/</URL>
      <Description>SUSE CVE CVE-2017-5578 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5579/</URL>
      <Description>SUSE CVE CVE-2017-5579 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5667/</URL>
      <Description>SUSE CVE CVE-2017-5667 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5715/</URL>
      <Description>SUSE CVE CVE-2017-5715 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5856/</URL>
      <Description>SUSE CVE CVE-2017-5856 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5857/</URL>
      <Description>SUSE CVE CVE-2017-5857 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5898/</URL>
      <Description>SUSE CVE CVE-2017-5898 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5973/</URL>
      <Description>SUSE CVE CVE-2017-5973 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6058/</URL>
      <Description>SUSE CVE CVE-2017-6058 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7471/</URL>
      <Description>SUSE CVE CVE-2017-7471 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7493/</URL>
      <Description>SUSE CVE CVE-2017-7493 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-8112/</URL>
      <Description>SUSE CVE CVE-2017-8112 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-8309/</URL>
      <Description>SUSE CVE CVE-2017-8309 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-8379/</URL>
      <Description>SUSE CVE CVE-2017-8379 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-8380/</URL>
      <Description>SUSE CVE CVE-2017-8380 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9503/</URL>
      <Description>SUSE CVE CVE-2017-9503 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9524/</URL>
      <Description>SUSE CVE CVE-2017-9524 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10839/</URL>
      <Description>SUSE CVE CVE-2018-10839 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11806/</URL>
      <Description>SUSE CVE CVE-2018-11806 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12126/</URL>
      <Description>SUSE CVE CVE-2018-12126 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12130/</URL>
      <Description>SUSE CVE CVE-2018-12130 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12207/</URL>
      <Description>SUSE CVE CVE-2018-12207 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-15746/</URL>
      <Description>SUSE CVE CVE-2018-15746 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16872/</URL>
      <Description>SUSE CVE CVE-2018-16872 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-17963/</URL>
      <Description>SUSE CVE CVE-2018-17963 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20123/</URL>
      <Description>SUSE CVE CVE-2018-20123 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20124/</URL>
      <Description>SUSE CVE CVE-2018-20124 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20125/</URL>
      <Description>SUSE CVE CVE-2018-20125 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20126/</URL>
      <Description>SUSE CVE CVE-2018-20126 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20191/</URL>
      <Description>SUSE CVE CVE-2018-20191 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20216/</URL>
      <Description>SUSE CVE CVE-2018-20216 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20815/</URL>
      <Description>SUSE CVE CVE-2018-20815 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3639/</URL>
      <Description>SUSE CVE CVE-2018-3639 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7858/</URL>
      <Description>SUSE CVE CVE-2018-7858 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-03812/</URL>
      <Description>SUSE CVE CVE-2019-03812 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11135/</URL>
      <Description>SUSE CVE CVE-2019-11135 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-12155/</URL>
      <Description>SUSE CVE CVE-2019-12155 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-13164/</URL>
      <Description>SUSE CVE CVE-2019-13164 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-14378/</URL>
      <Description>SUSE CVE CVE-2019-14378 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-15890/</URL>
      <Description>SUSE CVE CVE-2019-15890 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6778/</URL>
      <Description>SUSE CVE CVE-2019-6778 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8934/</URL>
      <Description>SUSE CVE CVE-2019-8934 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9824/</URL>
      <Description>SUSE CVE CVE-2019-9824 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10702/</URL>
      <Description>SUSE CVE CVE-2020-10702 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10717/</URL>
      <Description>SUSE CVE CVE-2020-10717 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10761/</URL>
      <Description>SUSE CVE CVE-2020-10761 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-11102/</URL>
      <Description>SUSE CVE CVE-2020-11102 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-11869/</URL>
      <Description>SUSE CVE CVE-2020-11869 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-13361/</URL>
      <Description>SUSE CVE CVE-2020-13361 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-13362/</URL>
      <Description>SUSE CVE CVE-2020-13362 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-13659/</URL>
      <Description>SUSE CVE CVE-2020-13659 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-13800/</URL>
      <Description>SUSE CVE CVE-2020-13800 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14364/</URL>
      <Description>SUSE CVE CVE-2020-14364 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-16092/</URL>
      <Description>SUSE CVE CVE-2020-16092 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-1711/</URL>
      <Description>SUSE CVE CVE-2020-1711 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-17380/</URL>
      <Description>SUSE CVE CVE-2020-17380 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-1983/</URL>
      <Description>SUSE CVE CVE-2020-1983 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25085/</URL>
      <Description>SUSE CVE CVE-2020-25085 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25723/</URL>
      <Description>SUSE CVE CVE-2020-25723 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27821/</URL>
      <Description>SUSE CVE CVE-2020-27821 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29129/</URL>
      <Description>SUSE CVE CVE-2020-29129 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-7039/</URL>
      <Description>SUSE CVE CVE-2020-7039 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-8608/</URL>
      <Description>SUSE CVE CVE-2020-8608 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-20181/</URL>
      <Description>SUSE CVE CVE-2021-20181 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-20203/</URL>
      <Description>SUSE CVE CVE-2021-20203 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-20221/</URL>
      <Description>SUSE CVE CVE-2021-20221 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-20257/</URL>
      <Description>SUSE CVE CVE-2021-20257 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-20263/</URL>
      <Description>SUSE CVE CVE-2021-20263 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3416/</URL>
      <Description>SUSE CVE CVE-2021-3416 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3527/</URL>
      <Description>SUSE CVE CVE-2021-3527 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3544/</URL>
      <Description>SUSE CVE CVE-2021-3544 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3545/</URL>
      <Description>SUSE CVE CVE-2021-3545 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3546/</URL>
      <Description>SUSE CVE CVE-2021-3546 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3582/</URL>
      <Description>SUSE CVE CVE-2021-3582 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3607/</URL>
      <Description>SUSE CVE CVE-2021-3607 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3608/</URL>
      <Description>SUSE CVE CVE-2021-3608 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3682/</URL>
      <Description>SUSE CVE CVE-2021-3682 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="qemu-6.1.0-32.1">
      <FullProductName ProductID="qemu-6.1.0-32.1">qemu-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-accel-qtest-6.1.0-32.1">
      <FullProductName ProductID="qemu-accel-qtest-6.1.0-32.1">qemu-accel-qtest-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-accel-tcg-x86-6.1.0-32.1">
      <FullProductName ProductID="qemu-accel-tcg-x86-6.1.0-32.1">qemu-accel-tcg-x86-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-arm-6.1.0-32.1">
      <FullProductName ProductID="qemu-arm-6.1.0-32.1">qemu-arm-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-audio-alsa-6.1.0-32.1">
      <FullProductName ProductID="qemu-audio-alsa-6.1.0-32.1">qemu-audio-alsa-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-audio-jack-6.1.0-32.1">
      <FullProductName ProductID="qemu-audio-jack-6.1.0-32.1">qemu-audio-jack-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-audio-pa-6.1.0-32.1">
      <FullProductName ProductID="qemu-audio-pa-6.1.0-32.1">qemu-audio-pa-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-audio-spice-6.1.0-32.1">
      <FullProductName ProductID="qemu-audio-spice-6.1.0-32.1">qemu-audio-spice-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-curl-6.1.0-32.1">
      <FullProductName ProductID="qemu-block-curl-6.1.0-32.1">qemu-block-curl-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-dmg-6.1.0-32.1">
      <FullProductName ProductID="qemu-block-dmg-6.1.0-32.1">qemu-block-dmg-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-gluster-6.1.0-32.1">
      <FullProductName ProductID="qemu-block-gluster-6.1.0-32.1">qemu-block-gluster-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-iscsi-6.1.0-32.1">
      <FullProductName ProductID="qemu-block-iscsi-6.1.0-32.1">qemu-block-iscsi-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-nfs-6.1.0-32.1">
      <FullProductName ProductID="qemu-block-nfs-6.1.0-32.1">qemu-block-nfs-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-rbd-6.1.0-32.1">
      <FullProductName ProductID="qemu-block-rbd-6.1.0-32.1">qemu-block-rbd-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-block-ssh-6.1.0-32.1">
      <FullProductName ProductID="qemu-block-ssh-6.1.0-32.1">qemu-block-ssh-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-chardev-baum-6.1.0-32.1">
      <FullProductName ProductID="qemu-chardev-baum-6.1.0-32.1">qemu-chardev-baum-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-chardev-spice-6.1.0-32.1">
      <FullProductName ProductID="qemu-chardev-spice-6.1.0-32.1">qemu-chardev-spice-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-extra-6.1.0-32.1">
      <FullProductName ProductID="qemu-extra-6.1.0-32.1">qemu-extra-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-guest-agent-6.1.0-32.1">
      <FullProductName ProductID="qemu-guest-agent-6.1.0-32.1">qemu-guest-agent-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-hw-display-qxl-6.1.0-32.1">
      <FullProductName ProductID="qemu-hw-display-qxl-6.1.0-32.1">qemu-hw-display-qxl-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-hw-display-virtio-gpu-6.1.0-32.1">
      <FullProductName ProductID="qemu-hw-display-virtio-gpu-6.1.0-32.1">qemu-hw-display-virtio-gpu-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-hw-display-virtio-gpu-pci-6.1.0-32.1">
      <FullProductName ProductID="qemu-hw-display-virtio-gpu-pci-6.1.0-32.1">qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-hw-display-virtio-vga-6.1.0-32.1">
      <FullProductName ProductID="qemu-hw-display-virtio-vga-6.1.0-32.1">qemu-hw-display-virtio-vga-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1">
      <FullProductName ProductID="qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1">qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-hw-usb-host-6.1.0-32.1">
      <FullProductName ProductID="qemu-hw-usb-host-6.1.0-32.1">qemu-hw-usb-host-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-hw-usb-redirect-6.1.0-32.1">
      <FullProductName ProductID="qemu-hw-usb-redirect-6.1.0-32.1">qemu-hw-usb-redirect-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-hw-usb-smartcard-6.1.0-32.1">
      <FullProductName ProductID="qemu-hw-usb-smartcard-6.1.0-32.1">qemu-hw-usb-smartcard-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ipxe-1.0.0+-32.1">
      <FullProductName ProductID="qemu-ipxe-1.0.0+-32.1">qemu-ipxe-1.0.0+-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ivshmem-tools-6.1.0-32.1">
      <FullProductName ProductID="qemu-ivshmem-tools-6.1.0-32.1">qemu-ivshmem-tools-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ksm-6.1.0-32.1">
      <FullProductName ProductID="qemu-ksm-6.1.0-32.1">qemu-ksm-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-kvm-6.1.0-32.1">
      <FullProductName ProductID="qemu-kvm-6.1.0-32.1">qemu-kvm-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-lang-6.1.0-32.1">
      <FullProductName ProductID="qemu-lang-6.1.0-32.1">qemu-lang-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-microvm-6.1.0-32.1">
      <FullProductName ProductID="qemu-microvm-6.1.0-32.1">qemu-microvm-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ppc-6.1.0-32.1">
      <FullProductName ProductID="qemu-ppc-6.1.0-32.1">qemu-ppc-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-s390x-6.1.0-32.1">
      <FullProductName ProductID="qemu-s390x-6.1.0-32.1">qemu-s390x-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-seabios-1.14.0_0_g155821a-32.1">
      <FullProductName ProductID="qemu-seabios-1.14.0_0_g155821a-32.1">qemu-seabios-1.14.0_0_g155821a-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-sgabios-8-32.1">
      <FullProductName ProductID="qemu-sgabios-8-32.1">qemu-sgabios-8-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-skiboot-6.1.0-32.1">
      <FullProductName ProductID="qemu-skiboot-6.1.0-32.1">qemu-skiboot-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-tools-6.1.0-32.1">
      <FullProductName ProductID="qemu-tools-6.1.0-32.1">qemu-tools-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ui-curses-6.1.0-32.1">
      <FullProductName ProductID="qemu-ui-curses-6.1.0-32.1">qemu-ui-curses-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ui-gtk-6.1.0-32.1">
      <FullProductName ProductID="qemu-ui-gtk-6.1.0-32.1">qemu-ui-gtk-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ui-opengl-6.1.0-32.1">
      <FullProductName ProductID="qemu-ui-opengl-6.1.0-32.1">qemu-ui-opengl-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ui-spice-app-6.1.0-32.1">
      <FullProductName ProductID="qemu-ui-spice-app-6.1.0-32.1">qemu-ui-spice-app-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ui-spice-core-6.1.0-32.1">
      <FullProductName ProductID="qemu-ui-spice-core-6.1.0-32.1">qemu-ui-spice-core-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-vgabios-1.14.0_0_g155821a-32.1">
      <FullProductName ProductID="qemu-vgabios-1.14.0_0_g155821a-32.1">qemu-vgabios-1.14.0_0_g155821a-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-vhost-user-gpu-6.1.0-32.1">
      <FullProductName ProductID="qemu-vhost-user-gpu-6.1.0-32.1">qemu-vhost-user-gpu-6.1.0-32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-x86-6.1.0-32.1">
      <FullProductName ProductID="qemu-x86-6.1.0-32.1">qemu-x86-6.1.0-32.1</FullProductName>
    </Branch>
    <Relationship ProductReference="qemu-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-6.1.0-32.1">qemu-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-accel-qtest-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1">qemu-accel-qtest-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-accel-tcg-x86-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1">qemu-accel-tcg-x86-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-arm-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-arm-6.1.0-32.1">qemu-arm-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-audio-alsa-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1">qemu-audio-alsa-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-audio-jack-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1">qemu-audio-jack-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-audio-pa-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1">qemu-audio-pa-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-audio-spice-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1">qemu-audio-spice-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-curl-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1">qemu-block-curl-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-dmg-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1">qemu-block-dmg-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-gluster-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1">qemu-block-gluster-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-iscsi-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1">qemu-block-iscsi-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-nfs-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1">qemu-block-nfs-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-rbd-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1">qemu-block-rbd-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-block-ssh-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1">qemu-block-ssh-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-chardev-baum-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1">qemu-chardev-baum-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-chardev-spice-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1">qemu-chardev-spice-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-extra-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-extra-6.1.0-32.1">qemu-extra-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-guest-agent-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1">qemu-guest-agent-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-hw-display-qxl-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1">qemu-hw-display-qxl-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-hw-display-virtio-gpu-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1">qemu-hw-display-virtio-gpu-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-hw-display-virtio-gpu-pci-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1">qemu-hw-display-virtio-gpu-pci-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-hw-display-virtio-vga-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1">qemu-hw-display-virtio-vga-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1">qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-hw-usb-host-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1">qemu-hw-usb-host-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-hw-usb-redirect-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1">qemu-hw-usb-redirect-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-hw-usb-smartcard-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1">qemu-hw-usb-smartcard-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ipxe-1.0.0+-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1">qemu-ipxe-1.0.0+-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ivshmem-tools-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1">qemu-ivshmem-tools-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ksm-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1">qemu-ksm-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-kvm-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1">qemu-kvm-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-lang-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-lang-6.1.0-32.1">qemu-lang-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-microvm-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1">qemu-microvm-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ppc-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1">qemu-ppc-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-s390x-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1">qemu-s390x-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-seabios-1.14.0_0_g155821a-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1">qemu-seabios-1.14.0_0_g155821a-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-sgabios-8-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-sgabios-8-32.1">qemu-sgabios-8-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-skiboot-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1">qemu-skiboot-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-tools-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-tools-6.1.0-32.1">qemu-tools-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ui-curses-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1">qemu-ui-curses-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ui-gtk-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1">qemu-ui-gtk-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ui-opengl-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1">qemu-ui-opengl-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ui-spice-app-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1">qemu-ui-spice-app-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ui-spice-core-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1">qemu-ui-spice-core-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-vgabios-1.14.0_0_g155821a-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1">qemu-vgabios-1.14.0_0_g155821a-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-vhost-user-gpu-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1">qemu-vhost-user-gpu-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-x86-6.1.0-32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-x86-6.1.0-32.1">qemu-x86-6.1.0-32.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.</Note>
    </Notes>
    <CVE>CVE-2014-0222</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.5</BaseScore>
        <Vector>AV:A/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0222.html</URL>
        <Description>CVE-2014-0222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1072223</URL>
        <Description>SUSE Bug 1072223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/877642</URL>
        <Description>SUSE Bug 877642</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/950367</URL>
        <Description>SUSE Bug 950367</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/964925</URL>
        <Description>SUSE Bug 964925</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the Cirrus VGA emulator (hw/display/cirrus_vga.c) in QEMU before 2.2.0 allows local guest users to execute arbitrary code via vectors related to blit regions. NOTE: this vulnerability exists because an incomplete fix for CVE-2007-1320.</Note>
    </Notes>
    <CVE>CVE-2014-8106</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8106.html</URL>
        <Description>CVE-2014-8106</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1023004</URL>
        <Description>SUSE Bug 1023004</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/907805</URL>
        <Description>SUSE Bug 907805</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the vnc_refresh_server_surface function in the VNC display driver in QEMU before 2.4.0.1 allows guest users to cause a denial of service (heap memory corruption and process crash) or possibly execute arbitrary code on the host via unspecified vectors, related to refreshing the server display surface.</Note>
    </Notes>
    <CVE>CVE-2015-5225</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:A/AC:H/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5225.html</URL>
        <Description>CVE-2015-5225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/942845</URL>
        <Description>SUSE Bug 942845</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">hw/ide/core.c in QEMU does not properly restrict the commands accepted by an ATAPI device, which allows guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash.</Note>
    </Notes>
    <CVE>CVE-2015-6855</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6855.html</URL>
        <Description>CVE-2015-6855</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/945404</URL>
        <Description>SUSE Bug 945404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/965156</URL>
        <Description>SUSE Bug 965156</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Qemu, when built with VNC display driver support, allows remote attackers to cause a denial of service (arithmetic exception and application crash) via crafted SetPixelFormat messages from a client.</Note>
    </Notes>
    <CVE>CVE-2015-8504</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8504.html</URL>
        <Description>CVE-2015-8504</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958491</URL>
        <Description>SUSE Bug 958491</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958493</URL>
        <Description>SUSE Bug 958493</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Human Monitor Interface support in QEMU allows remote attackers to cause a denial of service (out-of-bounds write and application crash).</Note>
    </Notes>
    <CVE>CVE-2015-8619</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8619.html</URL>
        <Description>CVE-2015-8619</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960334</URL>
        <Description>SUSE Bug 960334</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/965269</URL>
        <Description>SUSE Bug 965269</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The virgl_cmd_get_capset function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) built with Virtio GPU Device emulator support allows local guest OS users to cause a denial of service (out-of-bounds read and process crash) via a VIRTIO_GPU_CMD_GET_CAPSET command with a maximum capabilities size with a value of 0.</Note>
    </Notes>
    <CVE>CVE-2016-10028</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10028.html</URL>
        <Description>CVE-2016-10028</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1017084</URL>
        <Description>SUSE Bug 1017084</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1017085</URL>
        <Description>SUSE Bug 1017085</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185981</URL>
        <Description>SUSE Bug 1185981</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in hw/watchdog/wdt_i6300esb.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.</Note>
    </Notes>
    <CVE>CVE-2016-10155</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.3</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10155.html</URL>
        <Description>CVE-2016-10155</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021129</URL>
        <Description>SUSE Bug 1021129</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024183</URL>
        <Description>SUSE Bug 1024183</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.</Note>
    </Notes>
    <CVE>CVE-2016-1714</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1714.html</URL>
        <Description>CVE-2016-1714</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961691</URL>
        <Description>SUSE Bug 961691</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961692</URL>
        <Description>SUSE Bug 961692</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the descriptor buffer.</Note>
    </Notes>
    <CVE>CVE-2016-6490</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6490.html</URL>
        <Description>CVE-2016-6490</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991466</URL>
        <Description>SUSE Bug 991466</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/993854</URL>
        <Description>SUSE Bug 993854</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The vmxnet3_complete_packet function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host memory information by leveraging failure to initialize the txcq_descr object.</Note>
    </Notes>
    <CVE>CVE-2016-6836</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6836.html</URL>
        <Description>CVE-2016-6836</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/994760</URL>
        <Description>SUSE Bug 994760</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/994761</URL>
        <Description>SUSE Bug 994761</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pvscsi_convert_sglist function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging an incorrect cast.</Note>
    </Notes>
    <CVE>CVE-2016-7156</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7156.html</URL>
        <Description>CVE-2016-7156</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/997859</URL>
        <Description>SUSE Bug 997859</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) mptsas_config_manufacturing_1 and (2) mptsas_config_ioc_0 functions in hw/scsi/mptconfig.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via vectors involving MPTSAS_CONFIG_PACK.</Note>
    </Notes>
    <CVE>CVE-2016-7157</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7157.html</URL>
        <Description>CVE-2016-7157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/997860</URL>
        <Description>SUSE Bug 997860</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.</Note>
    </Notes>
    <CVE>CVE-2016-7161</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7161.html</URL>
        <Description>CVE-2016-7161</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001151</URL>
        <Description>SUSE Bug 1001151</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001152</URL>
        <Description>SUSE Bug 1001152</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to cursor.mask[] and cursor.image[] array sizes when processing a DEFINE_CURSOR svga command.</Note>
    </Notes>
    <CVE>CVE-2016-7170</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7170.html</URL>
        <Description>CVE-2016-7170</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998516</URL>
        <Description>SUSE Bug 998516</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pvscsi_ring_pop_req_descr function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit process IO loop to the ring size.</Note>
    </Notes>
    <CVE>CVE-2016-7421</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7421.html</URL>
        <Description>CVE-2016-7421</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999661</URL>
        <Description>SUSE Bug 999661</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via a large I/O descriptor buffer length value.</Note>
    </Notes>
    <CVE>CVE-2016-7422</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7422.html</URL>
        <Description>CVE-2016-7422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1000346</URL>
        <Description>SUSE Bug 1000346</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mptsas_process_scsi_io_request function in QEMU (aka Quick Emulator), when built with LSI SAS1068 Host Bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors involving MPTSASRequest objects.</Note>
    </Notes>
    <CVE>CVE-2016-7423</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7423.html</URL>
        <Description>CVE-2016-7423</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1000397</URL>
        <Description>SUSE Bug 1000397</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the usb_xhci_exit function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator), when the xhci uses msix, allows local guest OS administrators to cause a denial of service (memory consumption and possibly QEMU process crash) by repeatedly unplugging a USB device.</Note>
    </Notes>
    <CVE>CVE-2016-7466</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7466.html</URL>
        <Description>CVE-2016-7466</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1000345</URL>
        <Description>SUSE Bug 1000345</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The imx_fec_do_tx function in hw/net/imx_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.</Note>
    </Notes>
    <CVE>CVE-2016-7907</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7907.html</URL>
        <Description>CVE-2016-7907</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1002549</URL>
        <Description>SUSE Bug 1002549</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.</Note>
    </Notes>
    <CVE>CVE-2016-7908</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7908.html</URL>
        <Description>CVE-2016-7908</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1002550</URL>
        <Description>SUSE Bug 1002550</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003030</URL>
        <Description>SUSE Bug 1003030</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pcnet_rdra_addr function in hw/net/pcnet.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0.</Note>
    </Notes>
    <CVE>CVE-2016-7909</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7909.html</URL>
        <Description>CVE-2016-7909</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1002557</URL>
        <Description>SUSE Bug 1002557</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003032</URL>
        <Description>SUSE Bug 1003032</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the virtio_gpu_resource_create_2d function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_CREATE_2D commands.</Note>
    </Notes>
    <CVE>CVE-2016-7994</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7994.html</URL>
        <Description>CVE-2016-7994</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003613</URL>
        <Description>SUSE Bug 1003613</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of crafted buffer page select (PG) indexes.</Note>
    </Notes>
    <CVE>CVE-2016-7995</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7995.html</URL>
        <Description>CVE-2016-7995</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003612</URL>
        <Description>SUSE Bug 1003612</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003870</URL>
        <Description>SUSE Bug 1003870</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xhci_ring_fetch function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process.</Note>
    </Notes>
    <CVE>CVE-2016-8576</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8576.html</URL>
        <Description>CVE-2016-8576</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003878</URL>
        <Description>SUSE Bug 1003878</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004016</URL>
        <Description>SUSE Bug 1004016</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the v9fs_read function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation.</Note>
    </Notes>
    <CVE>CVE-2016-8577</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8577.html</URL>
        <Description>CVE-2016-8577</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003893</URL>
        <Description>SUSE Bug 1003893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004021</URL>
        <Description>SUSE Bug 1004021</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The v9fs_iov_vunmarshal function in fsdev/9p-iov-marshal.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) by sending an empty string parameter to a 9P operation.</Note>
    </Notes>
    <CVE>CVE-2016-8578</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8578.html</URL>
        <Description>CVE-2016-8578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003894</URL>
        <Description>SUSE Bug 1003894</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004023</URL>
        <Description>SUSE Bug 1004023</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The rc4030_write function in hw/dma/rc4030.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value.</Note>
    </Notes>
    <CVE>CVE-2016-8667</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8667.html</URL>
        <Description>CVE-2016-8667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004702</URL>
        <Description>SUSE Bug 1004702</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005004</URL>
        <Description>SUSE Bug 1005004</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The rocker_io_writel function in hw/net/rocker/rocker.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging failure to limit DMA buffer size.</Note>
    </Notes>
    <CVE>CVE-2016-8668</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8668.html</URL>
        <Description>CVE-2016-8668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004706</URL>
        <Description>SUSE Bug 1004706</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base.</Note>
    </Notes>
    <CVE>CVE-2016-8669</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8669.html</URL>
        <Description>CVE-2016-8669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004707</URL>
        <Description>SUSE Bug 1004707</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005005</URL>
        <Description>SUSE Bug 1005005</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The intel_hda_xfer function in hw/audio/intel-hda.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position.</Note>
    </Notes>
    <CVE>CVE-2016-8909</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8909.html</URL>
        <Description>CVE-2016-8909</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1006536</URL>
        <Description>SUSE Bug 1006536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007160</URL>
        <Description>SUSE Bug 1007160</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The rtl8139_cplus_transmit function in hw/net/rtl8139.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count.</Note>
    </Notes>
    <CVE>CVE-2016-8910</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8910.html</URL>
        <Description>CVE-2016-8910</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1006538</URL>
        <Description>SUSE Bug 1006538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007157</URL>
        <Description>SUSE Bug 1007157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024178</URL>
        <Description>SUSE Bug 1024178</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in hw/net/eepro100.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device.</Note>
    </Notes>
    <CVE>CVE-2016-9101</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9101.html</URL>
        <Description>CVE-2016-9101</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007391</URL>
        <Description>SUSE Bug 1007391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013668</URL>
        <Description>SUSE Bug 1013668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024181</URL>
        <Description>SUSE Bug 1024181</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) via a large number of Txattrcreate messages with the same fid number.</Note>
    </Notes>
    <CVE>CVE-2016-9102</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9102.html</URL>
        <Description>CVE-2016-9102</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007450</URL>
        <Description>SUSE Bug 1007450</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014256</URL>
        <Description>SUSE Bug 1014256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host heap memory information by reading xattribute values before writing to them.</Note>
    </Notes>
    <CVE>CVE-2016-9103</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9103.html</URL>
        <Description>CVE-2016-9103</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007454</URL>
        <Description>SUSE Bug 1007454</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014259</URL>
        <Description>SUSE Bug 1014259</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer overflows in the (1) v9fs_xattr_read and (2) v9fs_xattr_write functions in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via a crafted offset, which triggers an out-of-bounds access.</Note>
    </Notes>
    <CVE>CVE-2016-9104</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9104.html</URL>
        <Description>CVE-2016-9104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007493</URL>
        <Description>SUSE Bug 1007493</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014297</URL>
        <Description>SUSE Bug 1014297</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034990</URL>
        <Description>SUSE Bug 1034990</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the v9fs_link function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors involving a reference to the source fid object.</Note>
    </Notes>
    <CVE>CVE-2016-9105</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9105.html</URL>
        <Description>CVE-2016-9105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007494</URL>
        <Description>SUSE Bug 1007494</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014279</URL>
        <Description>SUSE Bug 1014279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the v9fs_write function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) by leveraging failure to free an IO vector.</Note>
    </Notes>
    <CVE>CVE-2016-9106</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9106.html</URL>
        <Description>CVE-2016-9106</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007495</URL>
        <Description>SUSE Bug 1007495</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014299</URL>
        <Description>SUSE Bug 1014299</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Qemu before version 2.9 is vulnerable to an improper link following when built with the VirtFS. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host.</Note>
    </Notes>
    <CVE>CVE-2016-9602</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.7</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9602.html</URL>
        <Description>CVE-2016-9602</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020427</URL>
        <Description>SUSE Bug 1020427</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.</Note>
    </Notes>
    <CVE>CVE-2016-9907</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9907.html</URL>
        <Description>CVE-2016-9907</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014109</URL>
        <Description>SUSE Bug 1014109</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014490</URL>
        <Description>SUSE Bug 1014490</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.</Note>
    </Notes>
    <CVE>CVE-2016-9921</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9921.html</URL>
        <Description>CVE-2016-9921</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014702</URL>
        <Description>SUSE Bug 1014702</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015169</URL>
        <Description>SUSE Bug 1015169</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">qemu-nbd in QEMU (aka Quick Emulator) does not ignore SIGPIPE, which allows remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt.</Note>
    </Notes>
    <CVE>CVE-2017-10664</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10664.html</URL>
        <Description>CVE-2017-10664</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1046636</URL>
        <Description>SUSE Bug 1046636</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1046637</URL>
        <Description>SUSE Bug 1046637</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in hw/usb/redirect.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages.</Note>
    </Notes>
    <CVE>CVE-2017-10806</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10806.html</URL>
        <Description>CVE-2017-10806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1047674</URL>
        <Description>SUSE Bug 1047674</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1047675</URL>
        <Description>SUSE Bug 1047675</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.</Note>
    </Notes>
    <CVE>CVE-2017-11334</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11334.html</URL>
        <Description>CVE-2017-11334</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1048902</URL>
        <Description>SUSE Bug 1048902</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1048920</URL>
        <Description>SUSE Bug 1048920</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dhcp_decode function in slirp/bootp.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) via a crafted DHCP options string.</Note>
    </Notes>
    <CVE>CVE-2017-11434</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11434.html</URL>
        <Description>CVE-2017-11434</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049381</URL>
        <Description>SUSE Bug 1049381</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049578</URL>
        <Description>SUSE Bug 1049578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The vga display update in mis-calculated the region for the dirty bitmap snapshot in case split screen mode is used causing a denial of service (assertion failure) in the cpu_physical_memory_snapshot_get_dirty function.</Note>
    </Notes>
    <CVE>CVE-2017-13673</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.3</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13673.html</URL>
        <Description>CVE-2017-13673</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056386</URL>
        <Description>SUSE Bug 1056386</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056387</URL>
        <Description>SUSE Bug 1056387</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1084604</URL>
        <Description>SUSE Bug 1084604</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the sofree function in slirp/socket.c in QEMU (aka Quick Emulator) allows attackers to cause a denial of service (QEMU instance crash) by leveraging failure to properly clear ifq_so from pending packets.</Note>
    </Notes>
    <CVE>CVE-2017-13711</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13711.html</URL>
        <Description>CVE-2017-13711</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056291</URL>
        <Description>SUSE Bug 1056291</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.</Note>
    </Notes>
    <CVE>CVE-2017-14167</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14167.html</URL>
        <Description>CVE-2017-14167</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057585</URL>
        <Description>SUSE Bug 1057585</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the v9fs_xattrwalk function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS users to obtain sensitive information from host heap memory via vectors related to reading extended attributes.</Note>
    </Notes>
    <CVE>CVE-2017-15038</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.3</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15038.html</URL>
        <Description>CVE-2017-15038</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1062069</URL>
        <Description>SUSE Bug 1062069</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.</Note>
    </Notes>
    <CVE>CVE-2017-15118</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15118.html</URL>
        <Description>CVE-2017-15118</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1070147</URL>
        <Description>SUSE Bug 1070147</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Qemu through 2.10.0 allows remote attackers to cause a memory leak by triggering slow data-channel read operations, related to io/channel-websock.c.</Note>
    </Notes>
    <CVE>CVE-2017-15268</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15268.html</URL>
        <Description>CVE-2017-15268</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1062942</URL>
        <Description>SUSE Bug 1062942</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mode4and5 write functions in hw/display/cirrus_vga.c in Qemu allow local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation.</Note>
    </Notes>
    <CVE>CVE-2017-15289</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15289.html</URL>
        <Description>CVE-2017-15289</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1063122</URL>
        <Description>SUSE Bug 1063122</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1063123</URL>
        <Description>SUSE Bug 1063123</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host.</Note>
    </Notes>
    <CVE>CVE-2017-2615</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2615.html</URL>
        <Description>CVE-2017-2615</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1023004</URL>
        <Description>SUSE Bug 1023004</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.</Note>
    </Notes>
    <CVE>CVE-2017-2620</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2620.html</URL>
        <Description>CVE-2017-2620</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024834</URL>
        <Description>SUSE Bug 1024834</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024972</URL>
        <Description>SUSE Bug 1024972</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server's response to a 'NBD_OPT_LIST' request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.</Note>
    </Notes>
    <CVE>CVE-2017-2630</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2630.html</URL>
        <Description>CVE-2017-2630</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1025396</URL>
        <Description>SUSE Bug 1025396</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in hw/audio/ac97.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.</Note>
    </Notes>
    <CVE>CVE-2017-5525</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.3</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5525.html</URL>
        <Description>CVE-2017-5525</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020491</URL>
        <Description>SUSE Bug 1020491</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in hw/audio/es1370.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.</Note>
    </Notes>
    <CVE>CVE-2017-5526</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.3</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5526.html</URL>
        <Description>CVE-2017-5526</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020589</URL>
        <Description>SUSE Bug 1020589</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1059777</URL>
        <Description>SUSE Bug 1059777</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="58">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the virgl_resource_attach_backing function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING commands.</Note>
    </Notes>
    <CVE>CVE-2017-5552</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.3</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5552.html</URL>
        <Description>CVE-2017-5552</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021195</URL>
        <Description>SUSE Bug 1021195</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="59">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the virtio_gpu_resource_attach_backing function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING commands.</Note>
    </Notes>
    <CVE>CVE-2017-5578</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.3</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5578.html</URL>
        <Description>CVE-2017-5578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021481</URL>
        <Description>SUSE Bug 1021481</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="60">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the serial_exit_core function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.</Note>
    </Notes>
    <CVE>CVE-2017-5579</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.3</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5579.html</URL>
        <Description>CVE-2017-5579</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021741</URL>
        <Description>SUSE Bug 1021741</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1022627</URL>
        <Description>SUSE Bug 1022627</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="61">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The sdhci_sdma_transfer_multi_blocks function in hw/sd/sdhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds heap access and crash) or execute arbitrary code on the QEMU host via vectors involving the data transfer length.</Note>
    </Notes>
    <CVE>CVE-2017-5667</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5667.html</URL>
        <Description>CVE-2017-5667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1022541</URL>
        <Description>SUSE Bug 1022541</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="62">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.</Note>
    </Notes>
    <CVE>CVE-2017-5715</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5715.html</URL>
        <Description>CVE-2017-5715</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1068032</URL>
        <Description>SUSE Bug 1068032</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074562</URL>
        <Description>SUSE Bug 1074562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074578</URL>
        <Description>SUSE Bug 1074578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074701</URL>
        <Description>SUSE Bug 1074701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074741</URL>
        <Description>SUSE Bug 1074741</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074919</URL>
        <Description>SUSE Bug 1074919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075006</URL>
        <Description>SUSE Bug 1075006</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075007</URL>
        <Description>SUSE Bug 1075007</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075262</URL>
        <Description>SUSE Bug 1075262</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075419</URL>
        <Description>SUSE Bug 1075419</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076115</URL>
        <Description>SUSE Bug 1076115</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076372</URL>
        <Description>SUSE Bug 1076372</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076606</URL>
        <Description>SUSE Bug 1076606</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078353</URL>
        <Description>SUSE Bug 1078353</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1080039</URL>
        <Description>SUSE Bug 1080039</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087887</URL>
        <Description>SUSE Bug 1087887</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087939</URL>
        <Description>SUSE Bug 1087939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088147</URL>
        <Description>SUSE Bug 1088147</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089055</URL>
        <Description>SUSE Bug 1089055</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1091815</URL>
        <Description>SUSE Bug 1091815</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1095735</URL>
        <Description>SUSE Bug 1095735</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1102517</URL>
        <Description>SUSE Bug 1102517</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105108</URL>
        <Description>SUSE Bug 1105108</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126516</URL>
        <Description>SUSE Bug 1126516</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173489</URL>
        <Description>SUSE Bug 1173489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201457</URL>
        <Description>SUSE Bug 1201457</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203236</URL>
        <Description>SUSE Bug 1203236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="63">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the megasas_handle_dcmd function in hw/scsi/megasas.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) via MegaRAID Firmware Interface (MFI) commands with the sglist size set to a value over 2 Gb.</Note>
    </Notes>
    <CVE>CVE-2017-5856</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.3</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5856.html</URL>
        <Description>CVE-2017-5856</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1023053</URL>
        <Description>SUSE Bug 1023053</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024186</URL>
        <Description>SUSE Bug 1024186</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="64">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the virgl_cmd_resource_unref function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_UNREF commands sent without detaching the backing storage beforehand.</Note>
    </Notes>
    <CVE>CVE-2017-5857</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.3</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5857.html</URL>
        <Description>CVE-2017-5857</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1023073</URL>
        <Description>SUSE Bug 1023073</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="65">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the emulated_apdu_from_guest function in usb/dev-smartcard-reader.c in Quick Emulator (Qemu), when built with the CCID Card device emulator support, allows local users to cause a denial of service (application crash) via a large Application Protocol Data Units (APDU) unit.</Note>
    </Notes>
    <CVE>CVE-2017-5898</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.8</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5898.html</URL>
        <Description>CVE-2017-5898</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1023907</URL>
        <Description>SUSE Bug 1023907</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024307</URL>
        <Description>SUSE Bug 1024307</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="66">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xhci_kick_epctx function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and QEMU process crash) via vectors related to control transfer descriptor sequence.</Note>
    </Notes>
    <CVE>CVE-2017-5973</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.3</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5973.html</URL>
        <Description>CVE-2017-5973</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1025109</URL>
        <Description>SUSE Bug 1025109</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1025188</URL>
        <Description>SUSE Bug 1025188</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="67">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in NetRxPkt::ehdr_buf in hw/net/net_rx_pkt.c in QEMU (aka Quick Emulator), when the VLANSTRIP feature is enabled on the vmxnet3 device, allows remote attackers to cause a denial of service (out-of-bounds access and QEMU process crash) via vectors related to VLAN stripping.</Note>
    </Notes>
    <CVE>CVE-2017-6058</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6058.html</URL>
        <Description>CVE-2017-6058</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1025837</URL>
        <Description>SUSE Bug 1025837</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="68">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System (9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing files on a shared host directory. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host.</Note>
    </Notes>
    <CVE>CVE-2017-7471</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7471.html</URL>
        <Description>CVE-2017-7471</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034866</URL>
        <Description>SUSE Bug 1034866</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034990</URL>
        <Description>SUSE Bug 1034990</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="69">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could use this flaw to escalate their privileges inside guest.</Note>
    </Notes>
    <CVE>CVE-2017-7493</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7493.html</URL>
        <Description>CVE-2017-7493</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1039495</URL>
        <Description>SUSE Bug 1039495</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="70">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count.</Note>
    </Notes>
    <CVE>CVE-2017-8112</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8112.html</URL>
        <Description>CVE-2017-8112</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036211</URL>
        <Description>SUSE Bug 1036211</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036470</URL>
        <Description>SUSE Bug 1036470</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="71">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.</Note>
    </Notes>
    <CVE>CVE-2017-8309</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8309.html</URL>
        <Description>CVE-2017-8309</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1037242</URL>
        <Description>SUSE Bug 1037242</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1037243</URL>
        <Description>SUSE Bug 1037243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="72">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the keyboard input event handlers support in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events.</Note>
    </Notes>
    <CVE>CVE-2017-8379</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8379.html</URL>
        <Description>CVE-2017-8379</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1037334</URL>
        <Description>SUSE Bug 1037334</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="73">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the "megasas_mmio_write" function in Qemu 2.9.0 allows remote attackers to have unspecified impact via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2017-8380</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8380.html</URL>
        <Description>CVE-2017-8380</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1037336</URL>
        <Description>SUSE Bug 1037336</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="74">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">QEMU (aka Quick Emulator), when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving megasas command processing.</Note>
    </Notes>
    <CVE>CVE-2017-9503</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9503.html</URL>
        <Description>CVE-2017-9503</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043296</URL>
        <Description>SUSE Bug 1043296</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043297</URL>
        <Description>SUSE Bug 1043297</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043312</URL>
        <Description>SUSE Bug 1043312</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="75">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The qemu-nbd server in QEMU (aka Quick Emulator), when built with the Network Block Device (NBD) Server support, allows remote attackers to cause a denial of service (segmentation fault and server crash) by leveraging failure to ensure that all initialization occurs before talking to a client in the nbd_negotiate function.</Note>
    </Notes>
    <CVE>CVE-2017-9524</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9524.html</URL>
        <Description>CVE-2017-9524</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043808</URL>
        <Description>SUSE Bug 1043808</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="76">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Qemu emulator &lt;= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.</Note>
    </Notes>
    <CVE>CVE-2018-10839</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10839.html</URL>
        <Description>CVE-2018-10839</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110910</URL>
        <Description>SUSE Bug 1110910</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110924</URL>
        <Description>SUSE Bug 1110924</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="77">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.</Note>
    </Notes>
    <CVE>CVE-2018-11806</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11806.html</URL>
        <Description>CVE-2018-11806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1096223</URL>
        <Description>SUSE Bug 1096223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1096224</URL>
        <Description>SUSE Bug 1096224</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="78">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf</Note>
    </Notes>
    <CVE>CVE-2018-12126</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12126.html</URL>
        <Description>CVE-2018-12126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103186</URL>
        <Description>SUSE Bug 1103186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111331</URL>
        <Description>SUSE Bug 1111331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132686</URL>
        <Description>SUSE Bug 1132686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135409</URL>
        <Description>SUSE Bug 1135409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135524</URL>
        <Description>SUSE Bug 1135524</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1137916</URL>
        <Description>SUSE Bug 1137916</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138534</URL>
        <Description>SUSE Bug 1138534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141977</URL>
        <Description>SUSE Bug 1141977</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149725</URL>
        <Description>SUSE Bug 1149725</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149726</URL>
        <Description>SUSE Bug 1149726</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149729</URL>
        <Description>SUSE Bug 1149729</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="79">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf</Note>
    </Notes>
    <CVE>CVE-2018-12130</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12130.html</URL>
        <Description>CVE-2018-12130</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103186</URL>
        <Description>SUSE Bug 1103186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111331</URL>
        <Description>SUSE Bug 1111331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132686</URL>
        <Description>SUSE Bug 1132686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135409</URL>
        <Description>SUSE Bug 1135409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1137916</URL>
        <Description>SUSE Bug 1137916</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138534</URL>
        <Description>SUSE Bug 1138534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141977</URL>
        <Description>SUSE Bug 1141977</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="80">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.</Note>
    </Notes>
    <CVE>CVE-2018-12207</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12207.html</URL>
        <Description>CVE-2018-12207</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117665</URL>
        <Description>SUSE Bug 1117665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1139073</URL>
        <Description>SUSE Bug 1139073</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1152505</URL>
        <Description>SUSE Bug 1152505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155812</URL>
        <Description>SUSE Bug 1155812</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155817</URL>
        <Description>SUSE Bug 1155817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155945</URL>
        <Description>SUSE Bug 1155945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="81">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">qemu-seccomp.c in QEMU might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread.</Note>
    </Notes>
    <CVE>CVE-2018-15746</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-15746.html</URL>
        <Description>CVE-2018-15746</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106222</URL>
        <Description>SUSE Bug 1106222</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="82">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS.</Note>
    </Notes>
    <CVE>CVE-2018-16872</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16872.html</URL>
        <Description>CVE-2018-16872</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119493</URL>
        <Description>SUSE Bug 1119493</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119494</URL>
        <Description>SUSE Bug 1119494</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="83">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.</Note>
    </Notes>
    <CVE>CVE-2018-17963</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-17963.html</URL>
        <Description>CVE-2018-17963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111013</URL>
        <Description>SUSE Bug 1111013</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111014</URL>
        <Description>SUSE Bug 1111014</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="84">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">pvrdma_realize in hw/rdma/vmw/pvrdma_main.c in QEMU has a Memory leak after an initialisation error.</Note>
    </Notes>
    <CVE>CVE-2018-20123</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20123.html</URL>
        <Description>CVE-2018-20123</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119437</URL>
        <Description>SUSE Bug 1119437</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119438</URL>
        <Description>SUSE Bug 1119438</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="85">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">hw/rdma/rdma_backend.c in QEMU allows guest OS users to trigger out-of-bounds access via a PvrdmaSqWqe ring element with a large num_sge value.</Note>
    </Notes>
    <CVE>CVE-2018-20124</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20124.html</URL>
        <Description>CVE-2018-20124</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119840</URL>
        <Description>SUSE Bug 1119840</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119841</URL>
        <Description>SUSE Bug 1119841</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="86">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">hw/rdma/vmw/pvrdma_cmd.c in QEMU allows attackers to cause a denial of service (NULL pointer dereference or excessive memory allocation) in create_cq_ring or create_qp_rings.</Note>
    </Notes>
    <CVE>CVE-2018-20125</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20125.html</URL>
        <Description>CVE-2018-20125</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119989</URL>
        <Description>SUSE Bug 1119989</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="87">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">hw/rdma/vmw/pvrdma_cmd.c in QEMU allows create_cq and create_qp memory leaks because errors are mishandled.</Note>
    </Notes>
    <CVE>CVE-2018-20126</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20126.html</URL>
        <Description>CVE-2018-20126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119991</URL>
        <Description>SUSE Bug 1119991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="88">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">hw/rdma/vmw/pvrdma_main.c in QEMU does not implement a read operation (such as uar_read by analogy to uar_write), which allows attackers to cause a denial of service (NULL pointer dereference).</Note>
    </Notes>
    <CVE>CVE-2018-20191</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20191.html</URL>
        <Description>CVE-2018-20191</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119979</URL>
        <Description>SUSE Bug 1119979</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119980</URL>
        <Description>SUSE Bug 1119980</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="89">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">QEMU can have an infinite loop in hw/rdma/vmw/pvrdma_dev_ring.c because return values are not checked (and -1 is mishandled).</Note>
    </Notes>
    <CVE>CVE-2018-20216</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20216.html</URL>
        <Description>CVE-2018-20216</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119984</URL>
        <Description>SUSE Bug 1119984</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119985</URL>
        <Description>SUSE Bug 1119985</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="90">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk.</Note>
    </Notes>
    <CVE>CVE-2018-20815</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20815.html</URL>
        <Description>CVE-2018-20815</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118900</URL>
        <Description>SUSE Bug 1118900</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130675</URL>
        <Description>SUSE Bug 1130675</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130680</URL>
        <Description>SUSE Bug 1130680</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138043</URL>
        <Description>SUSE Bug 1138043</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="91">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.</Note>
    </Notes>
    <CVE>CVE-2018-3639</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3639.html</URL>
        <Description>CVE-2018-3639</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074701</URL>
        <Description>SUSE Bug 1074701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085235</URL>
        <Description>SUSE Bug 1085235</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085308</URL>
        <Description>SUSE Bug 1085308</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087078</URL>
        <Description>SUSE Bug 1087078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092631</URL>
        <Description>SUSE Bug 1092631</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092885</URL>
        <Description>SUSE Bug 1092885</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094912</URL>
        <Description>SUSE Bug 1094912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098813</URL>
        <Description>SUSE Bug 1098813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1100394</URL>
        <Description>SUSE Bug 1100394</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1102640</URL>
        <Description>SUSE Bug 1102640</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105412</URL>
        <Description>SUSE Bug 1105412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111963</URL>
        <Description>SUSE Bug 1111963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172781</URL>
        <Description>SUSE Bug 1172781</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172782</URL>
        <Description>SUSE Bug 1172782</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172783</URL>
        <Description>SUSE Bug 1172783</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173489</URL>
        <Description>SUSE Bug 1173489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215674</URL>
        <Description>SUSE Bug 1215674</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="92">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Quick Emulator (aka QEMU), when built with the Cirrus CLGD 54xx VGA Emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds access and QEMU process crash) by leveraging incorrect region calculation when updating VGA display.</Note>
    </Notes>
    <CVE>CVE-2018-7858</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7858.html</URL>
        <Description>CVE-2018-7858</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1084604</URL>
        <Description>SUSE Bug 1084604</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="93">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">unknown</Note>
    </Notes>
    <CVE>CVE-2019-03812</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-03812.html</URL>
        <Description>CVE-2019-03812</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="94">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.</Note>
    </Notes>
    <CVE>CVE-2019-11135</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11135.html</URL>
        <Description>CVE-2019-11135</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1139073</URL>
        <Description>SUSE Bug 1139073</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1152497</URL>
        <Description>SUSE Bug 1152497</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1152505</URL>
        <Description>SUSE Bug 1152505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1152506</URL>
        <Description>SUSE Bug 1152506</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160120</URL>
        <Description>SUSE Bug 1160120</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="95">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2019-12155</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-12155.html</URL>
        <Description>CVE-2019-12155</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135902</URL>
        <Description>SUSE Bug 1135902</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135905</URL>
        <Description>SUSE Bug 1135905</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="96">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">qemu-bridge-helper.c in QEMU 3.1 and 4.0.0 does not ensure that a network interface name (obtained from bridge.conf or a --br=bridge option) is limited to the IFNAMSIZ size, which can lead to an ACL bypass.</Note>
    </Notes>
    <CVE>CVE-2019-13164</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-13164.html</URL>
        <Description>CVE-2019-13164</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1140402</URL>
        <Description>SUSE Bug 1140402</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="97">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.</Note>
    </Notes>
    <CVE>CVE-2019-14378</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-14378.html</URL>
        <Description>CVE-2019-14378</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1143794</URL>
        <Description>SUSE Bug 1143794</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1143797</URL>
        <Description>SUSE Bug 1143797</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="98">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.</Note>
    </Notes>
    <CVE>CVE-2019-15890</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-15890.html</URL>
        <Description>CVE-2019-15890</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149811</URL>
        <Description>SUSE Bug 1149811</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149813</URL>
        <Description>SUSE Bug 1149813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="99">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2019-6778</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6778.html</URL>
        <Description>CVE-2019-6778</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123156</URL>
        <Description>SUSE Bug 1123156</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123157</URL>
        <Description>SUSE Bug 1123157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="100">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">hw/ppc/spapr.c in QEMU through 3.1.0 allows Information Exposure because the hypervisor shares the /proc/device-tree/system-id and /proc/device-tree/model system attributes with a guest.</Note>
    </Notes>
    <CVE>CVE-2019-8934</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8934.html</URL>
        <Description>CVE-2019-8934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118900</URL>
        <Description>SUSE Bug 1118900</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126455</URL>
        <Description>SUSE Bug 1126455</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="101">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.</Note>
    </Notes>
    <CVE>CVE-2019-9824</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9824.html</URL>
        <Description>CVE-2019-9824</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118900</URL>
        <Description>SUSE Bug 1118900</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1129622</URL>
        <Description>SUSE Bug 1129622</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1129623</URL>
        <Description>SUSE Bug 1129623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="102">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.</Note>
    </Notes>
    <CVE>CVE-2020-10702</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10702.html</URL>
        <Description>CVE-2020-10702</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1168681</URL>
        <Description>SUSE Bug 1168681</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="103">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A potential DoS flaw was found in the virtio-fs shared file system daemon (virtiofsd) implementation of the QEMU version &gt;= v5.0. Virtio-fs is meant to share a host file system directory with a guest via virtio-fs device. If the guest opens the maximum number of file descriptors under the shared directory, a denial of service may occur. This flaw allows a guest user/process to cause this denial of service on the host.</Note>
    </Notes>
    <CVE>CVE-2020-10717</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10717.html</URL>
        <Description>CVE-2020-10717</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171110</URL>
        <Description>SUSE Bug 1171110</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="104">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An assertion failure issue was found in the Network Block Device(NBD) Server in all QEMU versions before QEMU 5.0.1. This flaw occurs when an nbd-client sends a spec-compliant request that is near the boundary of maximum permitted request length. A remote nbd-client could use this flaw to crash the qemu-nbd server resulting in a denial of service.</Note>
    </Notes>
    <CVE>CVE-2020-10761</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10761.html</URL>
        <Description>CVE-2020-10761</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172710</URL>
        <Description>SUSE Bug 1172710</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="105">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">hw/net/tulip.c in QEMU 4.2.0 has a buffer overflow during the copying of tx/rx buffers because the frame size is not validated against the r/w data length.</Note>
    </Notes>
    <CVE>CVE-2020-11102</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-11102.html</URL>
        <Description>CVE-2020-11102</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1168713</URL>
        <Description>SUSE Bug 1168713</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="106">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow was found in QEMU 4.0.1 through 4.2.0 in the way it implemented ATI VGA emulation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati-2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service.</Note>
    </Notes>
    <CVE>CVE-2020-11869</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-11869.html</URL>
        <Description>CVE-2020-11869</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1170537</URL>
        <Description>SUSE Bug 1170537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188609</URL>
        <Description>SUSE Bug 1188609</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="107">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In QEMU 5.0.0 and earlier, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.</Note>
    </Notes>
    <CVE>CVE-2020-13361</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-13361.html</URL>
        <Description>CVE-2020-13361</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172384</URL>
        <Description>SUSE Bug 1172384</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="108">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.</Note>
    </Notes>
    <CVE>CVE-2020-13362</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-13362.html</URL>
        <Description>CVE-2020-13362</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172383</URL>
        <Description>SUSE Bug 1172383</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="109">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer.</Note>
    </Notes>
    <CVE>CVE-2020-13659</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-13659.html</URL>
        <Description>CVE-2020-13659</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172386</URL>
        <Description>SUSE Bug 1172386</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="110">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ati-vga in hw/display/ati.c in QEMU 4.2.0 allows guest OS users to trigger infinite recursion via a crafted mm_index value during an ati_mm_read or ati_mm_write call.</Note>
    </Notes>
    <CVE>CVE-2020-13800</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-13800.html</URL>
        <Description>CVE-2020-13800</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172495</URL>
        <Description>SUSE Bug 1172495</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="111">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.</Note>
    </Notes>
    <CVE>CVE-2020-14364</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14364.html</URL>
        <Description>CVE-2020-14364</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175441</URL>
        <Description>SUSE Bug 1175441</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175534</URL>
        <Description>SUSE Bug 1175534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176494</URL>
        <Description>SUSE Bug 1176494</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177130</URL>
        <Description>SUSE Bug 1177130</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="112">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.</Note>
    </Notes>
    <CVE>CVE-2020-16092</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-16092.html</URL>
        <Description>CVE-2020-16092</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174641</URL>
        <Description>SUSE Bug 1174641</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="113">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU versions 2.12.0 before 4.2.1 handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host.</Note>
    </Notes>
    <CVE>CVE-2020-1711</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-1711.html</URL>
        <Description>CVE-2020-1711</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1166240</URL>
        <Description>SUSE Bug 1166240</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="114">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code with privileges of the QEMU process on the host.</Note>
    </Notes>
    <CVE>CVE-2020-17380</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-17380.html</URL>
        <Description>CVE-2020-17380</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175144</URL>
        <Description>SUSE Bug 1175144</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182282</URL>
        <Description>SUSE Bug 1182282</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="115">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.</Note>
    </Notes>
    <CVE>CVE-2020-1983</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-1983.html</URL>
        <Description>CVE-2020-1983</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1170940</URL>
        <Description>SUSE Bug 1170940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="116">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">QEMU 5.0.0 has a heap-based Buffer Overflow in flatview_read_continue in exec.c because hw/sd/sdhci.c mishandles a write operation in the SDHC_BLKSIZE case.</Note>
    </Notes>
    <CVE>CVE-2020-25085</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25085.html</URL>
        <Description>CVE-2020-25085</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176681</URL>
        <Description>SUSE Bug 1176681</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182282</URL>
        <Description>SUSE Bug 1182282</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="117">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service.</Note>
    </Notes>
    <CVE>CVE-2020-25723</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25723.html</URL>
        <Description>CVE-2020-25723</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178934</URL>
        <Description>SUSE Bug 1178934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178935</URL>
        <Description>SUSE Bug 1178935</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="118">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the memory management API of QEMU during the initialization of a memory region cache. This issue could lead to an out-of-bounds write access to the MSI-X table while performing MMIO operations. A guest user may abuse this flaw to crash the QEMU process on the host, resulting in a denial of service. This flaw affects QEMU versions prior to 5.2.0.</Note>
    </Notes>
    <CVE>CVE-2020-27821</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27821.html</URL>
        <Description>CVE-2020-27821</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179686</URL>
        <Description>SUSE Bug 1179686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="119">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.</Note>
    </Notes>
    <CVE>CVE-2020-29129</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29129.html</URL>
        <Description>CVE-2020-29129</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179466</URL>
        <Description>SUSE Bug 1179466</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179467</URL>
        <Description>SUSE Bug 1179467</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179477</URL>
        <Description>SUSE Bug 1179477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179484</URL>
        <Description>SUSE Bug 1179484</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="120">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tcp_emu in tcp_subr.c in libslirp 4.1.0, as used in QEMU 4.2.0, mismanages memory, as demonstrated by IRC DCC commands in EMU_IRC. This can cause a heap-based buffer overflow or other out-of-bounds access which can lead to a DoS or potential execute arbitrary code.</Note>
    </Notes>
    <CVE>CVE-2020-7039</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-7039.html</URL>
        <Description>CVE-2020-7039</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1161066</URL>
        <Description>SUSE Bug 1161066</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="121">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.</Note>
    </Notes>
    <CVE>CVE-2020-8608</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-8608.html</URL>
        <Description>CVE-2020-8608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1163018</URL>
        <Description>SUSE Bug 1163018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1163019</URL>
        <Description>SUSE Bug 1163019</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="122">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A race condition flaw was found in the 9pfs server implementation of QEMU up to and including 5.2.0. This flaw allows a malicious 9p client to cause a use-after-free error, potentially escalating their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2021-20181</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-20181.html</URL>
        <Description>CVE-2021-20181</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182137</URL>
        <Description>SUSE Bug 1182137</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="123">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.</Note>
    </Notes>
    <CVE>CVE-2021-20203</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-20203.html</URL>
        <Description>CVE-2021-20203</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181639</URL>
        <Description>SUSE Bug 1181639</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="124">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while updating controller state fields and their subsequent processing. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.</Note>
    </Notes>
    <CVE>CVE-2021-20221</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-20221.html</URL>
        <Description>CVE-2021-20221</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181933</URL>
        <Description>SUSE Bug 1181933</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="125">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.</Note>
    </Notes>
    <CVE>CVE-2021-20257</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-20257.html</URL>
        <Description>CVE-2021-20257</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182577</URL>
        <Description>SUSE Bug 1182577</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182846</URL>
        <Description>SUSE Bug 1182846</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="126">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the virtio-fs shared file system daemon (virtiofsd) of QEMU. The new 'xattrmap' option may cause the 'security.capability' xattr in the guest to not drop on file write, potentially leading to a modified, privileged executable in the guest. In rare circumstances, this flaw could be used by a malicious user to elevate their privileges within the guest.</Note>
    </Notes>
    <CVE>CVE-2021-20263</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-20263.html</URL>
        <Description>CVE-2021-20263</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183373</URL>
        <Description>SUSE Bug 1183373</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="127">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario.</Note>
    </Notes>
    <CVE>CVE-2021-3416</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3416.html</URL>
        <Description>CVE-2021-3416</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182968</URL>
        <Description>SUSE Bug 1182968</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1186473</URL>
        <Description>SUSE Bug 1186473</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="128">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array (VLA) on the stack without proper validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service.</Note>
    </Notes>
    <CVE>CVE-2021-3527</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3527.html</URL>
        <Description>CVE-2021-3527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1186012</URL>
        <Description>SUSE Bug 1186012</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="129">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Several memory leaks were found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. They exist in contrib/vhost-user-gpu/vhost-user-gpu.c and contrib/vhost-user-gpu/virgl.c due to improper release of memory (i.e., free) after effective lifetime.</Note>
    </Notes>
    <CVE>CVE-2021-3544</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3544.html</URL>
        <Description>CVE-2021-3544</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1186010</URL>
        <Description>SUSE Bug 1186010</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="130">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An information disclosure vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw exists in virgl_cmd_get_capset_info() in contrib/vhost-user-gpu/virgl.c and could occur due to the read of uninitialized memory. A malicious guest could exploit this issue to leak memory from the host.</Note>
    </Notes>
    <CVE>CVE-2021-3545</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3545.html</URL>
        <Description>CVE-2021-3545</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185990</URL>
        <Description>SUSE Bug 1185990</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="131">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out-of-bounds write vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw occurs while processing the 'VIRTIO_GPU_CMD_GET_CAPSET' command from the guest. It could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service condition, or potential code execution with the privileges of the QEMU process.</Note>
    </Notes>
    <CVE>CVE-2021-3546</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3546.html</URL>
        <Description>CVE-2021-3546</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185981</URL>
        <Description>SUSE Bug 1185981</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="132">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. The issue occurs while handling a "PVRDMA_CMD_CREATE_MR" command due to improper memory remapping (mremap). This flaw allows a malicious guest to crash the QEMU process on the host. The highest threat from this vulnerability is to system availability.</Note>
    </Notes>
    <CVE>CVE-2021-3582</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3582.html</URL>
        <Description>CVE-2021-3582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1187499</URL>
        <Description>SUSE Bug 1187499</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="133">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow was found in the QEMU implementation of VMWare's paravirtual RDMA device in versions prior to 6.1.0. The issue occurs while handling a "PVRDMA_REG_DSRHIGH" write from the guest due to improper input validation. This flaw allows a privileged guest user to make QEMU allocate a large amount of memory, resulting in a denial of service. The highest threat from this vulnerability is to system availability.</Note>
    </Notes>
    <CVE>CVE-2021-3607</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3607.html</URL>
        <Description>CVE-2021-3607</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1187539</URL>
        <Description>SUSE Bug 1187539</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="134">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device in versions prior to 6.1.0. The issue occurs while handling a "PVRDMA_REG_DSRHIGH" write from the guest and may result in a crash of QEMU or cause undefined behavior due to the access of an uninitialized pointer. The highest threat from this vulnerability is to system availability.</Note>
    </Notes>
    <CVE>CVE-2021-3608</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3608.html</URL>
        <Description>CVE-2021-3608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1187538</URL>
        <Description>SUSE Bug 1187538</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="135">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.</Note>
    </Notes>
    <CVE>CVE-2021-3682</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:qemu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-arm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-extra-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-lang-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-sgabios-8-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-tools-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-x86-6.1.0-32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3682.html</URL>
        <Description>CVE-2021-3682</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189145</URL>
        <Description>SUSE Bug 1189145</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
