<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">xen-4.15.1_01-1.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11520-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">xen-4.15.1_01-1.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the xen-4.15.1_01-1.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11520</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-1320/</URL>
      <Description>SUSE CVE CVE-2007-1320 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-1366/</URL>
      <Description>SUSE CVE CVE-2007-1366 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-3919/</URL>
      <Description>SUSE CVE CVE-2007-3919 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10013/</URL>
      <Description>SUSE CVE CVE-2016-10013 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10024/</URL>
      <Description>SUSE CVE CVE-2016-10024 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10025/</URL>
      <Description>SUSE CVE CVE-2016-10025 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7777/</URL>
      <Description>SUSE CVE CVE-2016-7777 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7908/</URL>
      <Description>SUSE CVE CVE-2016-7908 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7909/</URL>
      <Description>SUSE CVE CVE-2016-7909 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8667/</URL>
      <Description>SUSE CVE CVE-2016-8667 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8669/</URL>
      <Description>SUSE CVE CVE-2016-8669 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8910/</URL>
      <Description>SUSE CVE CVE-2016-8910 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9377/</URL>
      <Description>SUSE CVE CVE-2016-9377 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9379/</URL>
      <Description>SUSE CVE CVE-2016-9379 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9381/</URL>
      <Description>SUSE CVE CVE-2016-9381 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9382/</URL>
      <Description>SUSE CVE CVE-2016-9382 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9383/</URL>
      <Description>SUSE CVE CVE-2016-9383 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9384/</URL>
      <Description>SUSE CVE CVE-2016-9384 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9385/</URL>
      <Description>SUSE CVE CVE-2016-9385 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9386/</URL>
      <Description>SUSE CVE CVE-2016-9386 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9637/</URL>
      <Description>SUSE CVE CVE-2016-9637 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9921/</URL>
      <Description>SUSE CVE CVE-2016-9921 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9932/</URL>
      <Description>SUSE CVE CVE-2016-9932 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12135/</URL>
      <Description>SUSE CVE CVE-2017-12135 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12136/</URL>
      <Description>SUSE CVE CVE-2017-12136 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12137/</URL>
      <Description>SUSE CVE CVE-2017-12137 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2615/</URL>
      <Description>SUSE CVE CVE-2017-2615 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2620/</URL>
      <Description>SUSE CVE CVE-2017-2620 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5753/</URL>
      <Description>SUSE CVE CVE-2017-5753 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6505/</URL>
      <Description>SUSE CVE CVE-2017-6505 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-8309/</URL>
      <Description>SUSE CVE CVE-2017-8309 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9330/</URL>
      <Description>SUSE CVE CVE-2017-9330 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10471/</URL>
      <Description>SUSE CVE CVE-2018-10471 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10472/</URL>
      <Description>SUSE CVE CVE-2018-10472 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10981/</URL>
      <Description>SUSE CVE CVE-2018-10981 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10982/</URL>
      <Description>SUSE CVE CVE-2018-10982 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12126/</URL>
      <Description>SUSE CVE CVE-2018-12126 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12891/</URL>
      <Description>SUSE CVE CVE-2018-12891 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12892/</URL>
      <Description>SUSE CVE CVE-2018-12892 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12893/</URL>
      <Description>SUSE CVE CVE-2018-12893 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-15468/</URL>
      <Description>SUSE CVE CVE-2018-15468 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-15469/</URL>
      <Description>SUSE CVE CVE-2018-15469 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-15470/</URL>
      <Description>SUSE CVE CVE-2018-15470 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18883/</URL>
      <Description>SUSE CVE CVE-2018-18883 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19961/</URL>
      <Description>SUSE CVE CVE-2018-19961 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19963/</URL>
      <Description>SUSE CVE CVE-2018-19963 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19964/</URL>
      <Description>SUSE CVE CVE-2018-19964 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19965/</URL>
      <Description>SUSE CVE CVE-2018-19965 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19966/</URL>
      <Description>SUSE CVE CVE-2018-19966 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19967/</URL>
      <Description>SUSE CVE CVE-2018-19967 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3639/</URL>
      <Description>SUSE CVE CVE-2018-3639 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3646/</URL>
      <Description>SUSE CVE CVE-2018-3646 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3665/</URL>
      <Description>SUSE CVE CVE-2018-3665 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5244/</URL>
      <Description>SUSE CVE CVE-2018-5244 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7540/</URL>
      <Description>SUSE CVE CVE-2018-7540 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7541/</URL>
      <Description>SUSE CVE CVE-2018-7541 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7542/</URL>
      <Description>SUSE CVE CVE-2018-7542 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-8897/</URL>
      <Description>SUSE CVE CVE-2018-8897 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-17349/</URL>
      <Description>SUSE CVE CVE-2019-17349 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-0543/</URL>
      <Description>SUSE CVE CVE-2020-0543 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-11739/</URL>
      <Description>SUSE CVE CVE-2020-11739 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-11740/</URL>
      <Description>SUSE CVE CVE-2020-11740 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-11742/</URL>
      <Description>SUSE CVE CVE-2020-11742 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-11743/</URL>
      <Description>SUSE CVE CVE-2020-11743 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15563/</URL>
      <Description>SUSE CVE CVE-2020-15563 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15565/</URL>
      <Description>SUSE CVE CVE-2020-15565 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15566/</URL>
      <Description>SUSE CVE CVE-2020-15566 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15567/</URL>
      <Description>SUSE CVE CVE-2020-15567 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25595/</URL>
      <Description>SUSE CVE CVE-2020-25595 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25596/</URL>
      <Description>SUSE CVE CVE-2020-25596 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25597/</URL>
      <Description>SUSE CVE CVE-2020-25597 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25598/</URL>
      <Description>SUSE CVE CVE-2020-25598 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25599/</URL>
      <Description>SUSE CVE CVE-2020-25599 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25600/</URL>
      <Description>SUSE CVE CVE-2020-25600 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25601/</URL>
      <Description>SUSE CVE CVE-2020-25601 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25602/</URL>
      <Description>SUSE CVE CVE-2020-25602 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25603/</URL>
      <Description>SUSE CVE CVE-2020-25603 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25604/</URL>
      <Description>SUSE CVE CVE-2020-25604 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27670/</URL>
      <Description>SUSE CVE CVE-2020-27670 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27671/</URL>
      <Description>SUSE CVE CVE-2020-27671 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27672/</URL>
      <Description>SUSE CVE CVE-2020-27672 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27674/</URL>
      <Description>SUSE CVE CVE-2020-27674 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-28368/</URL>
      <Description>SUSE CVE CVE-2020-28368 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29040/</URL>
      <Description>SUSE CVE CVE-2020-29040 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29480/</URL>
      <Description>SUSE CVE CVE-2020-29480 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29481/</URL>
      <Description>SUSE CVE CVE-2020-29481 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29483/</URL>
      <Description>SUSE CVE CVE-2020-29483 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29484/</URL>
      <Description>SUSE CVE CVE-2020-29484 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29566/</URL>
      <Description>SUSE CVE CVE-2020-29566 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29567/</URL>
      <Description>SUSE CVE CVE-2020-29567 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29570/</URL>
      <Description>SUSE CVE CVE-2020-29570 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29571/</URL>
      <Description>SUSE CVE CVE-2020-29571 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-28687/</URL>
      <Description>SUSE CVE CVE-2021-28687 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="xen-4.15.1_01-1.2">
      <FullProductName ProductID="xen-4.15.1_01-1.2">xen-4.15.1_01-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-devel-4.15.1_01-1.2">
      <FullProductName ProductID="xen-devel-4.15.1_01-1.2">xen-devel-4.15.1_01-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-doc-html-4.15.1_01-1.2">
      <FullProductName ProductID="xen-doc-html-4.15.1_01-1.2">xen-doc-html-4.15.1_01-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-4.15.1_01-1.2">
      <FullProductName ProductID="xen-libs-4.15.1_01-1.2">xen-libs-4.15.1_01-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-32bit-4.15.1_01-1.2">
      <FullProductName ProductID="xen-libs-32bit-4.15.1_01-1.2">xen-libs-32bit-4.15.1_01-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-4.15.1_01-1.2">
      <FullProductName ProductID="xen-tools-4.15.1_01-1.2">xen-tools-4.15.1_01-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-domU-4.15.1_01-1.2">
      <FullProductName ProductID="xen-tools-domU-4.15.1_01-1.2">xen-tools-domU-4.15.1_01-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-xendomains-wait-disk-4.15.1_01-1.2">
      <FullProductName ProductID="xen-tools-xendomains-wait-disk-4.15.1_01-1.2">xen-tools-xendomains-wait-disk-4.15.1_01-1.2</FullProductName>
    </Branch>
    <Relationship ProductReference="xen-4.15.1_01-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-4.15.1_01-1.2">xen-4.15.1_01-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-devel-4.15.1_01-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2">xen-devel-4.15.1_01-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.15.1_01-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2">xen-doc-html-4.15.1_01-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.15.1_01-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2">xen-libs-4.15.1_01-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.15.1_01-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2">xen-libs-32bit-4.15.1_01-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.15.1_01-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2">xen-tools-4.15.1_01-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.15.1_01-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2">xen-tools-domU-4.15.1_01-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-xendomains-wait-disk-4.15.1_01-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2">xen-tools-xendomains-wait-disk-4.15.1_01-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple heap-based buffer overflows in the cirrus_invalidate_region function in the Cirrus VGA extension in QEMU 0.8.2, as used in Xen and possibly other products, might allow local users to execute arbitrary code via unspecified vectors related to "attempting to mark non-existent regions as dirty," aka the "bitblt" heap overflow.</Note>
    </Notes>
    <CVE>CVE-2007-1320</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-1320.html</URL>
        <Description>CVE-2007-1320</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/252519</URL>
        <Description>SUSE Bug 252519</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/270621</URL>
        <Description>SUSE Bug 270621</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/435135</URL>
        <Description>SUSE Bug 435135</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/448551</URL>
        <Description>SUSE Bug 448551</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">QEMU 0.8.2 allows local users to crash a virtual machine via the divisor operand to the aam instruction, as demonstrated by "aam 0x0," which triggers a divide-by-zero error.</Note>
    </Notes>
    <CVE>CVE-2007-1366</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-1366.html</URL>
        <Description>CVE-2007-1366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/252519</URL>
        <Description>SUSE Bug 252519</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/270621</URL>
        <Description>SUSE Bug 270621</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">(1) xenbaked and (2) xenmon.py in Xen 3.1 and earlier allow local users to truncate arbitrary files via a symlink attack on /tmp/xenq-shm.</Note>
    </Notes>
    <CVE>CVE-2007-3919</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-3919.html</URL>
        <Description>CVE-2007-3919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/334445</URL>
        <Description>SUSE Bug 334445</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.</Note>
    </Notes>
    <CVE>CVE-2016-10013</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.6</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10013.html</URL>
        <Description>CVE-2016-10013</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1016340</URL>
        <Description>SUSE Bug 1016340</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen through 4.8.x allows local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations.</Note>
    </Notes>
    <CVE>CVE-2016-10024</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10024.html</URL>
        <Description>CVE-2016-10024</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014298</URL>
        <Description>SUSE Bug 1014298</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">VMFUNC emulation in Xen 4.6.x through 4.8.x on x86 systems using AMD virtualization extensions (aka SVM) allows local HVM guest OS users to cause a denial of service (hypervisor crash) by leveraging a missing NULL pointer check.</Note>
    </Notes>
    <CVE>CVE-2016-10025</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10025.html</URL>
        <Description>CVE-2016-10025</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014300</URL>
        <Description>SUSE Bug 1014300</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.</Note>
    </Notes>
    <CVE>CVE-2016-7777</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7777.html</URL>
        <Description>CVE-2016-7777</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1000106</URL>
        <Description>SUSE Bug 1000106</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.</Note>
    </Notes>
    <CVE>CVE-2016-7908</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7908.html</URL>
        <Description>CVE-2016-7908</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1002550</URL>
        <Description>SUSE Bug 1002550</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003030</URL>
        <Description>SUSE Bug 1003030</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pcnet_rdra_addr function in hw/net/pcnet.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0.</Note>
    </Notes>
    <CVE>CVE-2016-7909</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7909.html</URL>
        <Description>CVE-2016-7909</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1002557</URL>
        <Description>SUSE Bug 1002557</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003032</URL>
        <Description>SUSE Bug 1003032</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The rc4030_write function in hw/dma/rc4030.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value.</Note>
    </Notes>
    <CVE>CVE-2016-8667</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8667.html</URL>
        <Description>CVE-2016-8667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004702</URL>
        <Description>SUSE Bug 1004702</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005004</URL>
        <Description>SUSE Bug 1005004</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base.</Note>
    </Notes>
    <CVE>CVE-2016-8669</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8669.html</URL>
        <Description>CVE-2016-8669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004707</URL>
        <Description>SUSE Bug 1004707</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005005</URL>
        <Description>SUSE Bug 1005005</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The rtl8139_cplus_transmit function in hw/net/rtl8139.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count.</Note>
    </Notes>
    <CVE>CVE-2016-8910</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8910.html</URL>
        <Description>CVE-2016-8910</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1006538</URL>
        <Description>SUSE Bug 1006538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007157</URL>
        <Description>SUSE Bug 1007157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024178</URL>
        <Description>SUSE Bug 1024178</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging IDT entry miscalculation.</Note>
    </Notes>
    <CVE>CVE-2016-9377</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9377.html</URL>
        <Description>CVE-2016-9377</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009108</URL>
        <Description>SUSE Bug 1009108</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pygrub boot loader emulator in Xen, when S-expression output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via string quotes and S-expressions in the bootloader configuration file.</Note>
    </Notes>
    <CVE>CVE-2016-9379</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.6</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9379.html</URL>
        <Description>CVE-2016-9379</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009111</URL>
        <Description>SUSE Bug 1009111</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a "double fetch" vulnerability.</Note>
    </Notes>
    <CVE>CVE-2016-9381</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9381.html</URL>
        <Description>CVE-2016-9381</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009109</URL>
        <Description>SUSE Bug 1009109</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.</Note>
    </Notes>
    <CVE>CVE-2016-9382</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.6</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9382.html</URL>
        <Description>CVE-2016-9382</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009103</URL>
        <Description>SUSE Bug 1009103</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen, when running on a 64-bit hypervisor, allows local x86 guest OS users to modify arbitrary memory and consequently obtain sensitive information, cause a denial of service (host crash), or execute arbitrary code on the host by leveraging broken emulation of bit test instructions.</Note>
    </Notes>
    <CVE>CVE-2016-9383</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.6</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9383.html</URL>
        <Description>CVE-2016-9383</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009107</URL>
        <Description>SUSE Bug 1009107</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen 4.7 allows local guest OS users to obtain sensitive host information by loading a 32-bit ELF symbol table.</Note>
    </Notes>
    <CVE>CVE-2016-9384</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9384.html</URL>
        <Description>CVE-2016-9384</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009105</URL>
        <Description>SUSE Bug 1009105</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.</Note>
    </Notes>
    <CVE>CVE-2016-9385</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9385.html</URL>
        <Description>CVE-2016-9385</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009104</URL>
        <Description>SUSE Bug 1009104</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The x86 emulator in Xen does not properly treat x86 NULL segments as unusable when accessing memory, which might allow local HVM guest users to gain privileges via vectors involving "unexpected" base/limit values.</Note>
    </Notes>
    <CVE>CVE-2016-9386</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.6</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9386.html</URL>
        <Description>CVE-2016-9386</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009100</URL>
        <Description>SUSE Bug 1009100</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.</Note>
    </Notes>
    <CVE>CVE-2016-9637</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:A/AC:H/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>3.7</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9637.html</URL>
        <Description>CVE-2016-9637</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011652</URL>
        <Description>SUSE Bug 1011652</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.</Note>
    </Notes>
    <CVE>CVE-2016-9921</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9921.html</URL>
        <Description>CVE-2016-9921</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014702</URL>
        <Description>SUSE Bug 1014702</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015169</URL>
        <Description>SUSE Bug 1015169</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix.</Note>
    </Notes>
    <CVE>CVE-2016-9932</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9932.html</URL>
        <Description>CVE-2016-9932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012651</URL>
        <Description>SUSE Bug 1012651</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1016340</URL>
        <Description>SUSE Bug 1016340</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen allows local OS guest users to cause a denial of service (crash) or possibly obtain sensitive information or gain privileges via vectors involving transitive grants.</Note>
    </Notes>
    <CVE>CVE-2017-12135</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:P/I:P/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12135.html</URL>
        <Description>CVE-2017-12135</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1051787</URL>
        <Description>SUSE Bug 1051787</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1169392</URL>
        <Description>SUSE Bug 1169392</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the grant table code in Xen 4.6.x through 4.9.x allows local guest OS administrators to cause a denial of service (free list corruption and host crash) or gain privileges on the host via vectors involving maptrack free list handling.</Note>
    </Notes>
    <CVE>CVE-2017-12136</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12136.html</URL>
        <Description>CVE-2017-12136</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1051789</URL>
        <Description>SUSE Bug 1051789</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">arch/x86/mm.c in Xen allows local PV guest OS users to gain host OS privileges via vectors related to map_grant_ref.</Note>
    </Notes>
    <CVE>CVE-2017-12137</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12137.html</URL>
        <Description>CVE-2017-12137</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1051788</URL>
        <Description>SUSE Bug 1051788</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host.</Note>
    </Notes>
    <CVE>CVE-2017-2615</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>9</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2615.html</URL>
        <Description>CVE-2017-2615</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1023004</URL>
        <Description>SUSE Bug 1023004</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.</Note>
    </Notes>
    <CVE>CVE-2017-2620</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>9</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2620.html</URL>
        <Description>CVE-2017-2620</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024834</URL>
        <Description>SUSE Bug 1024834</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024972</URL>
        <Description>SUSE Bug 1024972</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.</Note>
    </Notes>
    <CVE>CVE-2017-5753</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5753.html</URL>
        <Description>CVE-2017-5753</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1068032</URL>
        <Description>SUSE Bug 1068032</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074562</URL>
        <Description>SUSE Bug 1074562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074578</URL>
        <Description>SUSE Bug 1074578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074701</URL>
        <Description>SUSE Bug 1074701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075006</URL>
        <Description>SUSE Bug 1075006</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075419</URL>
        <Description>SUSE Bug 1075419</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075748</URL>
        <Description>SUSE Bug 1075748</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1080039</URL>
        <Description>SUSE Bug 1080039</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087084</URL>
        <Description>SUSE Bug 1087084</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087939</URL>
        <Description>SUSE Bug 1087939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089055</URL>
        <Description>SUSE Bug 1089055</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1136865</URL>
        <Description>SUSE Bug 1136865</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1209547</URL>
        <Description>SUSE Bug 1209547</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ohci_service_ed_list function in hw/usb/hcd-ohci.c in QEMU (aka Quick Emulator) before 2.9.0 allows local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors, a different vulnerability than CVE-2017-9330.</Note>
    </Notes>
    <CVE>CVE-2017-6505</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6505.html</URL>
        <Description>CVE-2017-6505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1028184</URL>
        <Description>SUSE Bug 1028184</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1028235</URL>
        <Description>SUSE Bug 1028235</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.</Note>
    </Notes>
    <CVE>CVE-2017-8309</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8309.html</URL>
        <Description>CVE-2017-8309</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1037242</URL>
        <Description>SUSE Bug 1037242</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1037243</URL>
        <Description>SUSE Bug 1037243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">QEMU (aka Quick Emulator) before 2.9.0, when built with the USB OHCI Emulation support, allows local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value, a different vulnerability than CVE-2017-6505.</Note>
    </Notes>
    <CVE>CVE-2017-9330</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9330.html</URL>
        <Description>CVE-2017-9330</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042159</URL>
        <Description>SUSE Bug 1042159</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042160</URL>
        <Description>SUSE Bug 1042160</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043157</URL>
        <Description>SUSE Bug 1043157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (out-of-bounds zero write and hypervisor crash) via unexpected INT 80 processing, because of an incorrect fix for CVE-2017-5754.</Note>
    </Notes>
    <CVE>CVE-2018-10471</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10471.html</URL>
        <Description>CVE-2018-10471</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089635</URL>
        <Description>SUSE Bug 1089635</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users (in certain configurations) to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot.</Note>
    </Notes>
    <CVE>CVE-2018-10472</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10472.html</URL>
        <Description>CVE-2018-10472</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089152</URL>
        <Description>SUSE Bug 1089152</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request.</Note>
    </Notes>
    <CVE>CVE-2018-10981</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10981.html</URL>
        <Description>CVE-2018-10981</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090823</URL>
        <Description>SUSE Bug 1090823</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (unexpectedly high interrupt number, array overrun, and hypervisor crash) or possibly gain hypervisor privileges by setting up an HPET timer to deliver interrupts in IO-APIC mode, aka vHPET interrupt injection.</Note>
    </Notes>
    <CVE>CVE-2018-10982</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10982.html</URL>
        <Description>CVE-2018-10982</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090822</URL>
        <Description>SUSE Bug 1090822</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf</Note>
    </Notes>
    <CVE>CVE-2018-12126</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12126.html</URL>
        <Description>CVE-2018-12126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103186</URL>
        <Description>SUSE Bug 1103186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111331</URL>
        <Description>SUSE Bug 1111331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132686</URL>
        <Description>SUSE Bug 1132686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135409</URL>
        <Description>SUSE Bug 1135409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135524</URL>
        <Description>SUSE Bug 1135524</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1137916</URL>
        <Description>SUSE Bug 1137916</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138534</URL>
        <Description>SUSE Bug 1138534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141977</URL>
        <Description>SUSE Bug 1141977</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149725</URL>
        <Description>SUSE Bug 1149725</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149726</URL>
        <Description>SUSE Bug 1149726</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149729</URL>
        <Description>SUSE Bug 1149729</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.10.x. Certain PV MMU operations may take a long time to process. For that reason Xen explicitly checks for the need to preempt the current vCPU at certain points. A few rarely taken code paths did bypass such checks. By suitably enforcing the conditions through its own page table contents, a malicious guest may cause such bypasses to be used for an unbounded number of iterations. A malicious or buggy PV guest may cause a Denial of Service (DoS) affecting the entire host. Specifically, it may prevent use of a physical CPU for an indeterminate period of time. All Xen versions from 3.4 onwards are vulnerable. Xen versions 3.3 and earlier are vulnerable to an even wider class of attacks, due to them lacking preemption checks altogether in the affected code paths. Only x86 systems are affected. ARM systems are not affected. Only multi-vCPU x86 PV guests can leverage the vulnerability. x86 HVM or PVH guests as well as x86 single-vCPU PV ones cannot leverage the vulnerability.</Note>
    </Notes>
    <CVE>CVE-2018-12891</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12891.html</URL>
        <Description>CVE-2018-12891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097521</URL>
        <Description>SUSE Bug 1097521</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen 4.7 through 4.10.x. libxl fails to pass the readonly flag to qemu when setting up a SCSI disk, due to what was probably an erroneous merge conflict resolution. Malicious guest administrators or (in some situations) users may be able to write to supposedly read-only disk images. Only emulated SCSI disks (specified as "sd" in the libxl disk configuration, or an equivalent) are affected. IDE disks ("hd") are not affected (because attempts to make them readonly are rejected). Additionally, CDROM devices (that is, devices specified to be presented to the guest as CDROMs, regardless of the nature of the backing storage on the host) are not affected; they are always read only. Only systems using qemu-xen (rather than qemu-xen-traditional) as the device model version are vulnerable. Only systems using libxl or libxl-based toolstacks are vulnerable. (This includes xl, and libvirt with the libxl driver.) The vulnerability is present in Xen versions 4.7 and later. (In earlier versions, provided that the patch for XSA-142 has been applied, attempts to create read only disks are rejected.) If the host and guest together usually support PVHVM, the issue is exploitable only if the malicious guest administrator has control of the guest kernel or guest kernel command line.</Note>
    </Notes>
    <CVE>CVE-2018-12892</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12892.html</URL>
        <Description>CVE-2018-12892</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097523</URL>
        <Description>SUSE Bug 1097523</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.10.x. One of the fixes in XSA-260 added some safety checks to help prevent Xen livelocking with debug exceptions. Unfortunately, due to an oversight, at least one of these safety checks can be triggered by a guest. A malicious PV guest can crash Xen, leading to a Denial of Service. All Xen systems which have applied the XSA-260 fix are vulnerable. Only x86 systems are vulnerable. ARM systems are not vulnerable. Only x86 PV guests can exploit the vulnerability. x86 HVM and PVH guests cannot exploit the vulnerability. An attacker needs to be able to control hardware debugging facilities to exploit the vulnerability, but such permissions are typically available to unprivileged users.</Note>
    </Notes>
    <CVE>CVE-2018-12893</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12893.html</URL>
        <Description>CVE-2018-12893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097522</URL>
        <Description>SUSE Bug 1097522</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.</Note>
    </Notes>
    <CVE>CVE-2018-15468</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-15468.html</URL>
        <Description>CVE-2018-15468</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103276</URL>
        <Description>SUSE Bug 1103276</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.11.x. ARM never properly implemented grant table v2, either in the hypervisor or in Linux. Unfortunately, an ARM guest can still request v2 grant tables; they will simply not be properly set up, resulting in subsequent grant-related hypercalls hitting BUG() checks. An unprivileged guest can cause a BUG() check in the hypervisor, resulting in a denial-of-service (crash).</Note>
    </Notes>
    <CVE>CVE-2018-15469</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-15469.html</URL>
        <Description>CVE-2018-15469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103275</URL>
        <Description>SUSE Bug 1103275</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.11.x. The logic in oxenstored for handling writes depended on the order of evaluation of expressions making up a tuple. As indicated in section 7.7.3 "Operations on data structures" of the OCaml manual, the order of evaluation of subexpressions is not specified. In practice, different implementations behave differently. Thus, oxenstored may not enforce the configured quota-maxentity. This allows a malicious or buggy guest to write as many xenstore entries as it wishes, causing unbounded memory usage in oxenstored. This can lead to a system-wide DoS.</Note>
    </Notes>
    <CVE>CVE-2018-15470</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-15470.html</URL>
        <Description>CVE-2018-15470</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103279</URL>
        <Description>SUSE Bug 1103279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen 4.9.x through 4.11.x, on Intel x86 platforms, allowing x86 HVM and PVH guests to cause a host OS denial of service (NULL pointer dereference) or possibly have unspecified other impact because nested VT-x is not properly restricted.</Note>
    </Notes>
    <CVE>CVE-2018-18883</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18883.html</URL>
        <Description>CVE-2018-18883</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1114405</URL>
        <Description>SUSE Bug 1114405</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.</Note>
    </Notes>
    <CVE>CVE-2018-19961</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19961.html</URL>
        <Description>CVE-2018-19961</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115040</URL>
        <Description>SUSE Bug 1115040</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen 4.11 allowing HVM guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because x86 IOREQ server resource accounting (for external emulators) was mishandled.</Note>
    </Notes>
    <CVE>CVE-2018-19963</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19963.html</URL>
        <Description>CVE-2018-19963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115043</URL>
        <Description>SUSE Bug 1115043</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen 4.11.x allowing x86 guest OS users to cause a denial of service (host OS hang) because the p2m lock remains unavailable indefinitely in certain error conditions.</Note>
    </Notes>
    <CVE>CVE-2018-19964</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19964.html</URL>
        <Description>CVE-2018-19964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115044</URL>
        <Description>SUSE Bug 1115044</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (aka Meltdown) mitigation.</Note>
    </Notes>
    <CVE>CVE-2018-19965</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19965.html</URL>
        <Description>CVE-2018-19965</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115045</URL>
        <Description>SUSE Bug 1115045</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because of an interpretation conflict for a union data structure associated with shadow paging. NOTE: this issue exists because of an incorrect fix for CVE-2017-15595.</Note>
    </Notes>
    <CVE>CVE-2018-19966</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19966.html</URL>
        <Description>CVE-2018-19966</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115047</URL>
        <Description>SUSE Bug 1115047</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.11.x on Intel x86 platforms allowing guest OS users to cause a denial of service (host OS hang) because Xen does not work around Intel's mishandling of certain HLE transactions associated with the KACQUIRE instruction prefix.</Note>
    </Notes>
    <CVE>CVE-2018-19967</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19967.html</URL>
        <Description>CVE-2018-19967</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1114988</URL>
        <Description>SUSE Bug 1114988</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.</Note>
    </Notes>
    <CVE>CVE-2018-3639</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3639.html</URL>
        <Description>CVE-2018-3639</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074701</URL>
        <Description>SUSE Bug 1074701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085235</URL>
        <Description>SUSE Bug 1085235</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085308</URL>
        <Description>SUSE Bug 1085308</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087078</URL>
        <Description>SUSE Bug 1087078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092631</URL>
        <Description>SUSE Bug 1092631</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092885</URL>
        <Description>SUSE Bug 1092885</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094912</URL>
        <Description>SUSE Bug 1094912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098813</URL>
        <Description>SUSE Bug 1098813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1100394</URL>
        <Description>SUSE Bug 1100394</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1102640</URL>
        <Description>SUSE Bug 1102640</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105412</URL>
        <Description>SUSE Bug 1105412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111963</URL>
        <Description>SUSE Bug 1111963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172781</URL>
        <Description>SUSE Bug 1172781</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172782</URL>
        <Description>SUSE Bug 1172782</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172783</URL>
        <Description>SUSE Bug 1172783</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173489</URL>
        <Description>SUSE Bug 1173489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215674</URL>
        <Description>SUSE Bug 1215674</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.</Note>
    </Notes>
    <CVE>CVE-2018-3646</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3646.html</URL>
        <Description>CVE-2018-3646</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087078</URL>
        <Description>SUSE Bug 1087078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087081</URL>
        <Description>SUSE Bug 1087081</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089343</URL>
        <Description>SUSE Bug 1089343</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1091107</URL>
        <Description>SUSE Bug 1091107</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1099306</URL>
        <Description>SUSE Bug 1099306</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1104365</URL>
        <Description>SUSE Bug 1104365</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1104894</URL>
        <Description>SUSE Bug 1104894</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106548</URL>
        <Description>SUSE Bug 1106548</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1113534</URL>
        <Description>SUSE Bug 1113534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1136865</URL>
        <Description>SUSE Bug 1136865</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.</Note>
    </Notes>
    <CVE>CVE-2018-3665</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3665.html</URL>
        <Description>CVE-2018-3665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087078</URL>
        <Description>SUSE Bug 1087078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087086</URL>
        <Description>SUSE Bug 1087086</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090338</URL>
        <Description>SUSE Bug 1090338</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1095241</URL>
        <Description>SUSE Bug 1095241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1095242</URL>
        <Description>SUSE Bug 1095242</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1096740</URL>
        <Description>SUSE Bug 1096740</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1100091</URL>
        <Description>SUSE Bug 1100091</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1100555</URL>
        <Description>SUSE Bug 1100555</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Xen 4.10, new infrastructure was introduced as part of an overhaul to how MSR emulation happens for guests. Unfortunately, one tracking structure isn't freed when a vcpu is destroyed. This allows guest OS administrators to cause a denial of service (host OS memory consumption) by rebooting many times.</Note>
    </Notes>
    <CVE>CVE-2018-5244</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5244.html</URL>
        <Description>CVE-2018-5244</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1073961</URL>
        <Description>SUSE Bug 1073961</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074966</URL>
        <Description>SUSE Bug 1074966</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (host OS CPU hang) via non-preemptable L3/L4 pagetable freeing.</Note>
    </Notes>
    <CVE>CVE-2018-7540</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7540.html</URL>
        <Description>CVE-2018-7540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1080635</URL>
        <Description>SUSE Bug 1080635</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.10.x allowing guest OS users to cause a denial of service (hypervisor crash) or gain privileges by triggering a grant-table transition from v2 to v1.</Note>
    </Notes>
    <CVE>CVE-2018-7541</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7541.html</URL>
        <Description>CVE-2018-7541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1080662</URL>
        <Description>SUSE Bug 1080662</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen 4.8.x through 4.10.x allowing x86 PVH guest OS users to cause a denial of service (NULL pointer dereference and hypervisor crash) by leveraging the mishandling of configurations that lack a Local APIC.</Note>
    </Notes>
    <CVE>CVE-2018-7542</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7542.html</URL>
        <Description>CVE-2018-7542</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1080634</URL>
        <Description>SUSE Bug 1080634</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="58">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL &lt; 3, the debug exception is delivered after the transfer to CPL &lt; 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.</Note>
    </Notes>
    <CVE>CVE-2018-8897</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-8897.html</URL>
        <Description>CVE-2018-8897</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087078</URL>
        <Description>SUSE Bug 1087078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087088</URL>
        <Description>SUSE Bug 1087088</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090368</URL>
        <Description>SUSE Bug 1090368</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090820</URL>
        <Description>SUSE Bug 1090820</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090869</URL>
        <Description>SUSE Bug 1090869</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092497</URL>
        <Description>SUSE Bug 1092497</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093522</URL>
        <Description>SUSE Bug 1093522</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093524</URL>
        <Description>SUSE Bug 1093524</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098813</URL>
        <Description>SUSE Bug 1098813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1100835</URL>
        <Description>SUSE Bug 1100835</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="59">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.12.x allowing Arm domU attackers to cause a denial of service (infinite loop) involving a LoadExcl or StoreExcl operation.</Note>
    </Notes>
    <CVE>CVE-2019-17349</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-17349.html</URL>
        <Description>CVE-2019-17349</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138294</URL>
        <Description>SUSE Bug 1138294</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="60">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.</Note>
    </Notes>
    <CVE>CVE-2020-0543</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-0543.html</URL>
        <Description>CVE-2020-0543</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154824</URL>
        <Description>SUSE Bug 1154824</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172205</URL>
        <Description>SUSE Bug 1172205</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172206</URL>
        <Description>SUSE Bug 1172206</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172207</URL>
        <Description>SUSE Bug 1172207</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172770</URL>
        <Description>SUSE Bug 1172770</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="61">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don't contain a memory barrier. On Arm, this means a processor is allowed to re-order the memory access with the preceding ones. In other words, the unlock may be seen by another processor before all the memory accesses within the "critical" section. As a consequence, it may be possible to have a writer executing a critical section at the same time as readers or another writer. In other words, many of the assumptions (e.g., a variable cannot be modified after a check) in the critical sections are not safe anymore. The read-write locks are used in hypercalls (such as grant-table ones), so a malicious guest could exploit the race. For instance, there is a small window where Xen can leak memory if XENMAPSPACE_grant_table is used concurrently. A malicious guest may be able to leak memory, or cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege escalation cannot be excluded.</Note>
    </Notes>
    <CVE>CVE-2020-11739</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-11739.html</URL>
        <Description>CVE-2020-11739</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1168142</URL>
        <Description>SUSE Bug 1168142</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="62">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been enabled for those guests. These buffers were not scrubbed.</Note>
    </Notes>
    <CVE>CVE-2020-11740</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-11740.html</URL>
        <Description>CVE-2020-11740</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1168140</URL>
        <Description>SUSE Bug 1168140</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="63">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. The fix for CVE-2017-12135 introduced a path through grant copy handling where success may be returned to the caller without any action taken. In particular, the status fields of individual operations are left uninitialised, and may result in errant behaviour in the caller of GNTTABOP_copy. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to copy a grant, it hits the incorrect exit path. This returns success to the caller without doing anything, which may cause crashes or other incorrect behaviour.</Note>
    </Notes>
    <CVE>CVE-2020-11742</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-11742.html</URL>
        <Description>CVE-2020-11742</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1169392</URL>
        <Description>SUSE Bug 1169392</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="64">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of a bad error path in GNTTABOP_map_grant. Grant table operations are expected to return 0 for success, and a negative number for errors. Some misplaced brackets cause one error path to return 1 instead of a negative value. The grant table code in Linux treats this condition as success, and proceeds with incorrectly initialised state. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to map a grant, it hits the incorrect error path. This will crash a Linux based dom0 or backend domain.</Note>
    </Notes>
    <CVE>CVE-2020-11743</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-11743.html</URL>
        <Description>CVE-2020-11743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1168143</URL>
        <Description>SUSE Bug 1168143</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="65">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests' dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to point at unmapped space. A malicious or buggy HVM guest may cause the hypervisor to crash, resulting in Denial of Service (DoS) affecting the entire host. Xen versions from 4.8 onwards are affected. Xen versions 4.7 and earlier are not affected. Only x86 systems are affected. Arm systems are not affected. Only x86 HVM guests using shadow paging can leverage the vulnerability. In addition, there needs to be an entity actively monitoring a guest's video frame buffer (typically for display purposes) in order for such a guest to be able to leverage the vulnerability. x86 PV guests, as well as x86 HVM guests using hardware assisted paging (HAP), cannot leverage the vulnerability.</Note>
    </Notes>
    <CVE>CVE-2020-15563</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15563.html</URL>
        <Description>CVE-2020-15563</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173377</URL>
        <Description>SUSE Bug 1173377</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="66">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require flushing of both TLBs. Furthermore, IOMMUs may be non-coherent, and hence prior to flushing IOMMU TLBs, a CPU cache also needs writing back to memory after changes were made. Such writing back of cached data was missing in particular when splitting large page mappings into smaller granularity ones. A malicious guest may be able to retain read/write DMA access to frames returned to Xen's free pool, and later reused for another purpose. Host crashes (leading to a Denial of Service) and privilege escalation cannot be ruled out. Xen versions from at least 3.2 onwards are affected. Only x86 Intel systems are affected. x86 AMD as well as Arm systems are not affected. Only x86 HVM guests using hardware assisted paging (HAP), having a passed through PCI device assigned, and having page table sharing enabled can leverage the vulnerability. Note that page table sharing will be enabled (by default) only if Xen considers IOMMU and CPU large page size support compatible.</Note>
    </Notes>
    <CVE>CVE-2020-15565</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15565.html</URL>
        <Description>CVE-2020-15565</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173378</URL>
        <Description>SUSE Bug 1173378</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="67">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a host OS crash because of incorrect error handling in event-channel port allocation. The allocation of an event-channel port may fail for multiple reasons: (1) port is already in use, (2) the memory allocation failed, or (3) the port we try to allocate is higher than what is supported by the ABI (e.g., 2L or FIFO) used by the guest or the limit set by an administrator (max_event_channels in xl cfg). Due to the missing error checks, only (1) will be considered an error. All the other cases will provide a valid port and will result in a crash when trying to access the event channel. When the administrator configured a guest to allow more than 1023 event channels, that guest may be able to crash the host. When Xen is out-of-memory, allocation of new event channels will result in crashing the host rather than reporting an error. Xen versions 4.10 and later are affected. All architectures are affected. The default configuration, when guests are created with xl/libxl, is not vulnerable, because of the default event-channel limit.</Note>
    </Notes>
    <CVE>CVE-2020-15566</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15566.html</URL>
        <Description>CVE-2020-15566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173376</URL>
        <Description>SUSE Bug 1173376</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="68">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of non-atomic bitfield writes. Depending on the compiler version and optimisation flags, Xen might expose a dangerous partially written PTE to the hardware, which an attacker might be able to race to exploit. A guest administrator or perhaps even an unprivileged guest user might be able to cause denial of service, data corruption, or privilege escalation. Only systems using Intel CPUs are vulnerable. Systems using AMD CPUs, and Arm systems, are not vulnerable. Only systems using nested paging (hap, aka nested paging, aka in this case Intel EPT) are vulnerable. Only HVM and PVH guests can exploit the vulnerability. The presence and scope of the vulnerability depends on the precise optimisations performed by the compiler used to build Xen. If the compiler generates (a) a single 64-bit write, or (b) a series of read-modify-write operations in the same order as the source code, the hypervisor is not vulnerable. For example, in one test build using GCC 8.3 with normal settings, the compiler generated multiple (unlocked) read-modify-write operations in source-code order, which did not constitute a vulnerability. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code-generation options). The source code clearly violates the C rules, and thus should be considered vulnerable.</Note>
    </Notes>
    <CVE>CVE-2020-15567</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15567.html</URL>
        <Description>CVE-2020-15567</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173380</URL>
        <Description>SUSE Bug 1173380</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="69">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.14.x. The PCI passthrough code improperly uses register data. Code paths in Xen's MSI handling have been identified that act on unsanitized values read back from device hardware registers. While devices strictly compliant with PCI specifications shouldn't be able to affect these registers, experience shows that it's very common for devices to have out-of-spec "backdoor" operations that can affect the result of these reads. A not fully trusted guest may be able to crash Xen, leading to a Denial of Service (DoS) for the entire system. Privilege escalation and information leaks cannot be excluded. All versions of Xen supporting PCI passthrough are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with passed through PCI devices may be able to leverage the vulnerability. Only systems passing through devices with out-of-spec ("backdoor") functionality can cause issues. Experience shows that such out-of-spec functionality is common; unless you have reason to believe that your device does not have such functionality, it's better to assume that it does.</Note>
    </Notes>
    <CVE>CVE-2020-25595</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25595.html</URL>
        <Description>CVE-2020-25595</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176344</URL>
        <Description>SUSE Bug 1176344</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="70">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.14.x. x86 PV guest kernels can experience denial of service via SYSENTER. The SYSENTER instruction leaves various state sanitization activities to software. One of Xen's sanitization paths injects a #GP fault, and incorrectly delivers it twice to the guest. This causes the guest kernel to observe a kernel-privilege #GP fault (typically fatal) rather than a user-privilege #GP fault (usually converted into SIGSEGV/etc.). Malicious or buggy userspace can crash the guest kernel, resulting in a VM Denial of Service. All versions of Xen from 3.2 onwards are vulnerable. Only x86 systems are vulnerable. ARM platforms are not vulnerable. Only x86 systems that support the SYSENTER instruction in 64bit mode are vulnerable. This is believed to be Intel, Centaur, and Shanghai CPUs. AMD and Hygon CPUs are not believed to be vulnerable. Only x86 PV guests can exploit the vulnerability. x86 PVH / HVM guests cannot exploit the vulnerability.</Note>
    </Notes>
    <CVE>CVE-2020-25596</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25596.html</URL>
        <Description>CVE-2020-25596</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176345</URL>
        <Description>SUSE Bug 1176345</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="71">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.14.x. There is mishandling of the constraint that once-valid event channels may not turn invalid. Logic in the handling of event channel operations in Xen assumes that an event channel, once valid, will not become invalid over the life time of a guest. However, operations like the resetting of all event channels may involve decreasing one of the bounds checked when determining validity. This may lead to bug checks triggering, crashing the host. An unprivileged guest may be able to crash Xen, leading to a Denial of Service (DoS) for the entire system. All Xen versions from 4.4 onwards are vulnerable. Xen versions 4.3 and earlier are not vulnerable. Only systems with untrusted guests permitted to create more than the default number of event channels are vulnerable. This number depends on the architecture and type of guest. For 32-bit x86 PV guests, this is 1023; for 64-bit x86 PV guests, and for all ARM guests, this number is 4095. Systems where untrusted guests are limited to fewer than this number are not vulnerable. Note that xl and libxl limit max_event_channels to 1023 by default, so systems using exclusively xl, libvirt+libxl, or their own toolstack based on libxl, and not explicitly setting max_event_channels, are not vulnerable.</Note>
    </Notes>
    <CVE>CVE-2020-25597</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25597.html</URL>
        <Description>CVE-2020-25597</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176346</URL>
        <Description>SUSE Bug 1176346</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="72">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen 4.14.x. There is a missing unlock in the XENMEM_acquire_resource error path. The RCU (Read, Copy, Update) mechanism is a synchronisation primitive. A buggy error path in the XENMEM_acquire_resource exits without releasing an RCU reference, which is conceptually similar to forgetting to unlock a spinlock. A buggy or malicious HVM stubdomain can cause an RCU reference to be leaked. This causes subsequent administration operations, (e.g., CPU offline) to livelock, resulting in a host Denial of Service. The buggy codepath has been present since Xen 4.12. Xen 4.14 and later are vulnerable to the DoS. The side effects are believed to be benign on Xen 4.12 and 4.13, but patches are provided nevertheless. The vulnerability can generally only be exploited by x86 HVM VMs, as these are generally the only type of VM that have a Qemu stubdomain. x86 PV and PVH domains, as well as ARM VMs, typically don't use a stubdomain. Only VMs using HVM stubdomains can exploit the vulnerability. VMs using PV stubdomains, or with emulators running in dom0, cannot exploit the vulnerability.</Note>
    </Notes>
    <CVE>CVE-2020-25598</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25598.html</URL>
        <Description>CVE-2020-25598</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176341</URL>
        <Description>SUSE Bug 1176341</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="73">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.14.x. There are evtchn_reset() race conditions. Uses of EVTCHNOP_reset (potentially by a guest on itself) or XEN_DOMCTL_soft_reset (by itself covered by XSA-77) can lead to the violation of various internal assumptions. This may lead to out of bounds memory accesses or triggering of bug checks. In particular, x86 PV guests may be able to elevate their privilege to that of the host. Host and guest crashes are also possible, leading to a Denial of Service (DoS). Information leaks cannot be ruled out. All Xen versions from 4.5 onwards are vulnerable. Xen versions 4.4 and earlier are not vulnerable.</Note>
    </Notes>
    <CVE>CVE-2020-25599</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25599.html</URL>
        <Description>CVE-2020-25599</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176349</URL>
        <Description>SUSE Bug 1176349</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="74">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.14.x. Out of bounds event channels are available to 32-bit x86 domains. The so called 2-level event channel model imposes different limits on the number of usable event channels for 32-bit x86 domains vs 64-bit or Arm (either bitness) ones. 32-bit x86 domains can use only 1023 channels, due to limited space in their shared (between guest and Xen) information structure, whereas all other domains can use up to 4095 in this model. The recording of the respective limit during domain initialization, however, has occurred at a time where domains are still deemed to be 64-bit ones, prior to actually honoring respective domain properties. At the point domains get recognized as 32-bit ones, the limit didn't get updated accordingly. Due to this misbehavior in Xen, 32-bit domains (including Domain 0) servicing other domains may observe event channel allocations to succeed when they should really fail. Subsequent use of such event channels would then possibly lead to corruption of other parts of the shared info structure. An unprivileged guest may cause another domain, in particular Domain 0, to misbehave. This may lead to a Denial of Service (DoS) for the entire system. All Xen versions from 4.4 onwards are vulnerable. Xen versions 4.3 and earlier are not vulnerable. Only x86 32-bit domains servicing other domains are vulnerable. Arm systems, as well as x86 64-bit domains, are not vulnerable.</Note>
    </Notes>
    <CVE>CVE-2020-25600</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25600.html</URL>
        <Description>CVE-2020-25600</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176348</URL>
        <Description>SUSE Bug 1176348</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="75">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.14.x. There is a lack of preemption in evtchn_reset() / evtchn_destroy(). In particular, the FIFO event channel model allows guests to have a large number of event channels active at a time. Closing all of these (when resetting all event channels or when cleaning up after the guest) may take extended periods of time. So far, there was no arrangement for preemption at suitable intervals, allowing a CPU to spend an almost unbounded amount of time in the processing of these operations. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. All Xen versions are vulnerable in principle. Whether versions 4.3 and older are vulnerable depends on underlying hardware characteristics.</Note>
    </Notes>
    <CVE>CVE-2020-25601</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25601.html</URL>
        <Description>CVE-2020-25601</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176350</URL>
        <Description>SUSE Bug 1176350</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="76">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.14.x. An x86 PV guest can trigger a host OS crash when handling guest access to MSR_MISC_ENABLE. When a guest accesses certain Model Specific Registers, Xen first reads the value from hardware to use as the basis for auditing the guest access. For the MISC_ENABLE MSR, which is an Intel specific MSR, this MSR read is performed without error handling for a #GP fault, which is the consequence of trying to read this MSR on non-Intel hardware. A buggy or malicious PV guest administrator can crash Xen, resulting in a host Denial of Service. Only x86 systems are vulnerable. ARM systems are not vulnerable. Only Xen versions 4.11 and onwards are vulnerable. 4.10 and earlier are not vulnerable. Only x86 systems that do not implement the MISC_ENABLE MSR (0x1a0) are vulnerable. AMD and Hygon systems do not implement this MSR and are vulnerable. Intel systems do implement this MSR and are not vulnerable. Other manufacturers have not been checked. Only x86 PV guests can exploit the vulnerability. x86 HVM/PVH guests cannot exploit the vulnerability.</Note>
    </Notes>
    <CVE>CVE-2020-25602</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25602.html</URL>
        <Description>CVE-2020-25602</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176339</URL>
        <Description>SUSE Bug 1176339</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="77">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.14.x. There are missing memory barriers when accessing/allocating an event channel. Event channels control structures can be accessed lockless as long as the port is considered to be valid. Such a sequence is missing an appropriate memory barrier (e.g., smp_*mb()) to prevent both the compiler and CPU from re-ordering access. A malicious guest may be able to cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege escalation cannot be excluded. Systems running all versions of Xen are affected. Whether a system is vulnerable will depend on the CPU and compiler used to build Xen. For all systems, the presence and the scope of the vulnerability depend on the precise re-ordering performed by the compiler used to build Xen. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code generation options). GCC documentation clearly suggests that re-ordering is possible. Arm systems will also be vulnerable if the CPU is able to re-order memory access. Please consult your CPU vendor. x86 systems are only vulnerable if a compiler performs re-ordering.</Note>
    </Notes>
    <CVE>CVE-2020-25603</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25603.html</URL>
        <Description>CVE-2020-25603</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176347</URL>
        <Description>SUSE Bug 1176347</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="78">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.14.x. There is a race condition when migrating timers between x86 HVM vCPUs. When migrating timers of x86 HVM guests between its vCPUs, the locking model used allows for a second vCPU of the same guest (also operating on the timers) to release a lock that it didn't acquire. The most likely effect of the issue is a hang or crash of the hypervisor, i.e., a Denial of Service (DoS). All versions of Xen are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only x86 HVM guests can leverage the vulnerability. x86 PV and PVH cannot leverage the vulnerability. Only guests with more than one vCPU can exploit the vulnerability.</Note>
    </Notes>
    <CVE>CVE-2020-25604</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25604.html</URL>
        <Description>CVE-2020-25604</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176343</URL>
        <Description>SUSE Bug 1176343</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="79">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because an AMD IOMMU page-table entry can be half-updated.</Note>
    </Notes>
    <CVE>CVE-2020-27670</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27670.html</URL>
        <Description>CVE-2020-27670</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177414</URL>
        <Description>SUSE Bug 1177414</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183925</URL>
        <Description>SUSE Bug 1183925</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="80">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.14.x allowing x86 HVM and PVH guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because coalescing of per-page IOMMU TLB flushes is mishandled.</Note>
    </Notes>
    <CVE>CVE-2020-27671</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27671.html</URL>
        <Description>CVE-2020-27671</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177413</URL>
        <Description>SUSE Bug 1177413</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183925</URL>
        <Description>SUSE Bug 1183925</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="81">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages.</Note>
    </Notes>
    <CVE>CVE-2020-27672</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27672.html</URL>
        <Description>CVE-2020-27672</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177412</URL>
        <Description>SUSE Bug 1177412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183925</URL>
        <Description>SUSE Bug 1183925</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="82">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.</Note>
    </Notes>
    <CVE>CVE-2020-27674</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27674.html</URL>
        <Description>CVE-2020-27674</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177409</URL>
        <Description>SUSE Bug 1177409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="83">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.</Note>
    </Notes>
    <CVE>CVE-2020-28368</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-28368.html</URL>
        <Description>CVE-2020-28368</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178591</URL>
        <Description>SUSE Bug 1178591</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="84">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.14.x allowing x86 HVM guest OS users to cause a denial of service (stack corruption), cause a data leak, or possibly gain privileges because of an off-by-one error. NOTE: this issue is caused by an incorrect fix for CVE-2020-27671.</Note>
    </Notes>
    <CVE>CVE-2020-29040</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29040.html</URL>
        <Description>CVE-2020-29040</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178963</URL>
        <Description>SUSE Bug 1178963</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="85">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests. This information allows some insight into overall system configuration (including the number and general nature of other guests), and configuration of other guests (including the number and general nature of other guests' devices). This information might be commercially interesting or might make other attacks easier. There is not believed to be exposure of sensitive data. Specifically, there is no exposure of VNC passwords, port numbers, pathnames in host and guest filesystems, cryptographic keys, or within-guest data.</Note>
    </Notes>
    <CVE>CVE-2020-29480</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29480.html</URL>
        <Description>CVE-2020-29480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179496</URL>
        <Description>SUSE Bug 1179496</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="86">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.14.x. Access rights of Xenstore nodes are per domid. Unfortunately, existing granted access rights are not removed when a domain is being destroyed. This means that a new domain created with the same domid will inherit the access rights to Xenstore nodes from the previous domain(s) with the same domid. Because all Xenstore entries of a guest below /local/domain/&lt;domid&gt; are being deleted by Xen tools when a guest is destroyed, only Xenstore entries of other guests still running are affected. For example, a newly created guest domain might be able to read sensitive information that had belonged to a previously existing guest domain. Both Xenstore implementations (C and Ocaml) are vulnerable.</Note>
    </Notes>
    <CVE>CVE-2020-29481</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29481.html</URL>
        <Description>CVE-2020-29481</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176349</URL>
        <Description>SUSE Bug 1176349</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179498</URL>
        <Description>SUSE Bug 1179498</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="87">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.14.x. Xenstored and guests communicate via a shared memory page using a specific protocol. When a guest violates this protocol, xenstored will drop the connection to that guest. Unfortunately, this is done by just removing the guest from xenstored's internal management, resulting in the same actions as if the guest had been destroyed, including sending an @releaseDomain event. @releaseDomain events do not say that the guest has been removed. All watchers of this event must look at the states of all guests to find the guest that has been removed. When an @releaseDomain is generated due to a domain xenstored protocol violation, because the guest is still running, the watchers will not react. Later, when the guest is actually destroyed, xenstored will no longer have it stored in its internal data base, so no further @releaseDomain event will be sent. This can lead to a zombie domain; memory mappings of that guest's memory will not be removed, due to the missing event. This zombie domain will be cleaned up only after another domain is destroyed, as that will trigger another @releaseDomain event. If the device model of the guest that violated the Xenstore protocol is running in a stub-domain, a use-after-free case could happen in xenstored, after having removed the guest from its internal data base, possibly resulting in a crash of xenstored. A malicious guest can block resources of the host for a period after its own death. Guests with a stub domain device model can eventually crash xenstored, resulting in a more serious denial of service (the prevention of any further domain management operations). Only the C variant of Xenstore is affected; the Ocaml variant is not affected. Only HVM guests with a stubdom device model can cause a serious DoS.</Note>
    </Notes>
    <CVE>CVE-2020-29483</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29483.html</URL>
        <Description>CVE-2020-29483</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179502</URL>
        <Description>SUSE Bug 1179502</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="88">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.14.x. When a Xenstore watch fires, the xenstore client that registered the watch will receive a Xenstore message containing the path of the modified Xenstore entry that triggered the watch, and the tag that was specified when registering the watch. Any communication with xenstored is done via Xenstore messages, consisting of a message header and the payload. The payload length is limited to 4096 bytes. Any request to xenstored resulting in a response with a payload longer than 4096 bytes will result in an error. When registering a watch, the payload length limit applies to the combined length of the watched path and the specified tag. Because watches for a specific path are also triggered for all nodes below that path, the payload of a watch event message can be longer than the payload needed to register the watch. A malicious guest that registers a watch using a very large tag (i.e., with a registration operation payload length close to the 4096 byte limit) can cause the generation of watch events with a payload length larger than 4096 bytes, by writing to Xenstore entries below the watched path. This will result in an error condition in xenstored. This error can result in a NULL pointer dereference, leading to a crash of xenstored. A malicious guest administrator can cause xenstored to crash, leading to a denial of service. Following a xenstored crash, domains may continue to run, but management operations will be impossible. Only C xenstored is affected, oxenstored is not affected.</Note>
    </Notes>
    <CVE>CVE-2020-29484</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29484.html</URL>
        <Description>CVE-2020-29484</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179501</URL>
        <Description>SUSE Bug 1179501</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="89">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.14.x. When they require assistance from the device model, x86 HVM guests must be temporarily de-scheduled. The device model will signal Xen when it has completed its operation, via an event channel, so that the relevant vCPU is rescheduled. If the device model were to signal Xen without having actually completed the operation, the de-schedule / re-schedule cycle would repeat. If, in addition, Xen is resignalled very quickly, the re-schedule may occur before the de-schedule was fully complete, triggering a shortcut. This potentially repeating process uses ordinary recursive function calls, and thus could result in a stack overflow. A malicious or buggy stubdomain serving a HVM guest can cause Xen to crash, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are affected. Arm systems are not affected. Only x86 stubdomains serving HVM guests can exploit the vulnerability.</Note>
    </Notes>
    <CVE>CVE-2020-29566</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29566.html</URL>
        <Description>CVE-2020-29566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179506</URL>
        <Description>SUSE Bug 1179506</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="90">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen 4.14.x. When moving IRQs between CPUs to distribute the load of IRQ handling, IRQ vectors are dynamically allocated and de-allocated on the relevant CPUs. De-allocation has to happen when certain constraints are met. If these conditions are not met when first checked, the checking CPU may send an interrupt to itself, in the expectation that this IRQ will be delivered only after the condition preventing the cleanup has cleared. For two specific IRQ vectors, this expectation was violated, resulting in a continuous stream of self-interrupts, which renders the CPU effectively unusable. A domain with a passed through PCI device can cause lockup of a physical CPU, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with physical PCI devices passed through to them can exploit the vulnerability.</Note>
    </Notes>
    <CVE>CVE-2020-29567</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29567.html</URL>
        <Description>CVE-2020-29567</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179513</URL>
        <Description>SUSE Bug 1179513</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="91">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.14.x. Recording of the per-vCPU control block mapping maintained by Xen and that of pointers into the control block is reversed. The consumer assumes, seeing the former initialized, that the latter are also ready for use. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system.</Note>
    </Notes>
    <CVE>CVE-2020-29570</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29570.html</URL>
        <Description>CVE-2020-29570</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179514</URL>
        <Description>SUSE Bug 1179514</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="92">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.14.x. A bounds check common to most operation time functions specific to FIFO event channels depends on the CPU observing consistent state. While the producer side uses appropriately ordered writes, the consumer side isn't protected against re-ordered reads, and may hence end up de-referencing a NULL pointer. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. Only Arm systems may be vulnerable. Whether a system is vulnerable depends on the specific CPU. x86 systems are not vulnerable.</Note>
    </Notes>
    <CVE>CVE-2020-29571</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29571.html</URL>
        <Description>CVE-2020-29571</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179516</URL>
        <Description>SUSE Bug 1179516</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="93">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">HVM soft-reset crashes toolstack libxl requires all data structures passed across its public interface to be initialized before use and disposed of afterwards by calling a specific set of functions. Many internal data structures also require this initialize / dispose discipline, but not all of them. When the "soft reset" feature was implemented, the libxl__domain_suspend_state structure didn't require any initialization or disposal. At some point later, an initialization function was introduced for the structure; but the "soft reset" path wasn't refactored to call the initialization function. When a guest nwo initiates a "soft reboot", uninitialized data structure leads to an assert() when later code finds the structure in an unexpected state. The effect of this is to crash the process monitoring the guest. How this affects the system depends on the structure of the toolstack. For xl, this will have no security-relevant effect: every VM has its own independent monitoring process, which contains no state. The domain in question will hang in a crashed state, but can be destroyed by `xl destroy` just like any other non-cooperating domain. For daemon-based toolstacks linked against libxl, such as libvirt, this will crash the toolstack, losing the state of any in-progress operations (localized DoS), and preventing further administrator operations unless the daemon is configured to restart automatically (system-wide DoS). If crashes "leak" resources, then repeated crashes could use up resources, also causing a system-wide DoS.</Note>
    </Notes>
    <CVE>CVE-2021-28687</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-28687.html</URL>
        <Description>CVE-2021-28687</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183072</URL>
        <Description>SUSE Bug 1183072</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
