Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-3710 (GCVE-0-2016-3710)
Vulnerability from cvelistv5
Published
2016-05-11 21:00
Modified
2024-08-06 00:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:03:34.465Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://xenbits.xen.org/xsa/advisory-179.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "RHSA-2016:0999", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0999.html" }, { "name": "90316", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/90316" }, { "name": "RHSA-2016:0725", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0725.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "RHSA-2016:1000", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1000.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.citrix.com/article/CTX212736" }, { "name": "RHSA-2016:1002", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1002.html" }, { "name": "RHSA-2016:1001", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1001.html" }, { "name": "RHSA-2016:0997", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0997.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862" }, { "name": "1035794", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035794" }, { "name": "RHSA-2016:1943", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1943.html" }, { "name": "RHSA-2016:1019", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1019.html" }, { "name": "USN-2974-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2974-1" }, { "name": "[oss-security] 20160509 CVE-2016-3710 Qemu: vga: out-of-bounds r/w access issue", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/05/09/3" }, { "name": "RHSA-2016:0724", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0724.html" }, { "name": "[Qemu-devel] 20160509 [PULL 1/5] vga: fix banked access bounds checking (CVE-2016-3710)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01197.html" }, { "name": "RHSA-2016:1224", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2016:1224" }, { "name": "DSA-3573", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3573" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \"Dark Portal\" issue." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://xenbits.xen.org/xsa/advisory-179.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "RHSA-2016:0999", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0999.html" }, { "name": "90316", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/90316" }, { "name": "RHSA-2016:0725", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0725.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "RHSA-2016:1000", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1000.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.citrix.com/article/CTX212736" }, { "name": "RHSA-2016:1002", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1002.html" }, { "name": "RHSA-2016:1001", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1001.html" }, { "name": "RHSA-2016:0997", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0997.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862" }, { "name": "1035794", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035794" }, { "name": "RHSA-2016:1943", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1943.html" }, { "name": "RHSA-2016:1019", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1019.html" }, { "name": "USN-2974-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2974-1" }, { "name": "[oss-security] 20160509 CVE-2016-3710 Qemu: vga: out-of-bounds r/w access issue", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/05/09/3" }, { "name": "RHSA-2016:0724", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0724.html" }, { "name": "[Qemu-devel] 20160509 [PULL 1/5] vga: fix banked access bounds checking (CVE-2016-3710)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01197.html" }, { "name": "RHSA-2016:1224", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2016:1224" }, { "name": "DSA-3573", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3573" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-3710", "datePublished": "2016-05-11T21:00:00", "dateReserved": "2016-03-30T00:00:00", "dateUpdated": "2024-08-06T00:03:34.465Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-3710\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2016-05-11T21:59:01.077\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \\\"Dark Portal\\\" issue.\"},{\"lang\":\"es\",\"value\":\"El m\u00f3dulo VGA en QEMU lleva a cabo incorrectamente comprobaciones de l\u00edmites sobre acceso almacenado a la memoria de v\u00eddeo, lo que permite a administradores locales de SO invitado ejecutar c\u00f3digo arbitrario sobre el anfitri\u00f3n cambiando los modos de acceso despu\u00e9s de establecer el banco de registros, tambi\u00e9n conocido como el problema \\\"Dark Portal\\\".\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.0,\"impactScore\":6.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:helion_openstack:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46D566AF-D1DE-4EAD-B881-DC40D1DE780C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:helion_openstack:2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81BED703-422A-4937-8BF0-F83C248188F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:helion_openstack:2.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A241BABC-E6A8-43B1-BED6-77FC38E337BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:helion_openstack:2.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBE8AEFE-C74B-4E24-8EBA-35207DE756E3\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E88A537F-F4D0-46B9-9E37-965233C2A355\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.5.1\",\"matchCriteriaId\":\"26A04769-0D4E-4B7B-B54C-C686FB69D85A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qemu:qemu:2.6.0:rc0:*:*:*:*:*:*\",\"matchCriteriaId\":\"544B3E62-7AE7-4925-9E50-CAFDAD5A3851\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qemu:qemu:2.6.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8C11472-2B2A-4110-A04B-5CFBA0763432\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qemu:qemu:2.6.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECD3B63B-1388-4C24-B9B9-043C04FE1F1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qemu:qemu:2.6.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B10C154A-F559-4BE1-94AE-8619D4634564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qemu:qemu:2.6.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7126355-4164-4E54-BCC3-D3D6D1E5AF81\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:vm_server:3.2:*:*:*:*:*:x86:*\",\"matchCriteriaId\":\"FC9E8528-0FB8-4BF0-A9EF-6CC84A2631A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:vm_server:3.3:*:*:*:*:*:x86:*\",\"matchCriteriaId\":\"8663D0AF-825D-48FC-8AED-498434A0AA76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:vm_server:3.4:*:*:*:*:*:x86:*\",\"matchCriteriaId\":\"457955E5-41E5-4E17-8435-AA0F6F757A21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"62A2AC02-A933-4E51-810E-5D040B476B7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7B037A8-72A6-4DFF-94B2-D688A5F6F876\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"44B8FEDF-6CB0-46E9-9AD7-4445B001C158\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.0\",\"matchCriteriaId\":\"DE91B02A-0F07-437D-8AFC-38541C5A04AD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B152EDF3-3140-4343-802F-F4F1C329F5C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31EC146C-A6F6-4C0D-AF87-685286262DAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DAA72A4-AC7D-4544-89D4-5B07961D5A95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8B8C725-34CF-4340-BE7B-37E58CF706D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D86166F9-BBF0-4650-8CCD-0F9C97104D21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C8D871B-AEA1-4407-AEE3-47EC782250FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98381E61-F082-4302-B51F-5648884F998B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99A687E-EAE6-417E-A88E-D0082BC194CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B353CE99-D57C-465B-AAB0-73EF581127D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44B067C7-735E-43C9-9188-7E1522A02491\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8442C20-41F9-47FD-9A12-E724D3A31FD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF77CDCF-B9C9-427D-B2BF-36650FB2148C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21690BAC-2129-4A33-9B48-1F3BF30072A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6755B6AD-0422-467B-8115-34A60B1D1A40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17F256A9-D3B9-4C72-B013-4EFD878BFEA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0724.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0725.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0997.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0999.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1001.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1002.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1019.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1943.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.citrix.com/article/CTX212736\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3573\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/05/09/3\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/90316\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1035794\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2974-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://xenbits.xen.org/xsa/advisory-179.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2016:1224\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01197.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0724.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0725.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0997.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0999.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1943.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.citrix.com/article/CTX212736\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3573\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/05/09/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/90316\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1035794\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2974-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://xenbits.xen.org/xsa/advisory-179.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2016:1224\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01197.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]}]}}" } }
suse-su-2016:1698-1
Vulnerability from csaf_suse
Published
2016-06-28 14:31
Modified
2016-06-28 14:31
Summary
Security update for kvm
Notes
Title of the patch
Security update for kvm
Description of the patch
kvm was updated to fix 33 security issues.
These security issues were fixed:
- CVE-2016-4439: Avoid OOB access in 53C9X emulation (bsc#980711)
- CVE-2016-4441: Avoid OOB access in 53C9X emulation (bsc#980723)
- CVE-2016-3710: Fixed VGA emulation based OOB access with potential for guest escape (bsc#978158)
- CVE-2016-3712: Fixed VGa emulation based DOS and OOB read access exploit (bsc#978160)
- CVE-2016-4037: Fixed USB ehci based DOS (bsc#976109)
- CVE-2016-2538: Fixed potential OOB access in USB net device emulation (bsc#967969)
- CVE-2016-2841: Fixed OOB access / hang in ne2000 emulation (bsc#969350)
- CVE-2016-2858: Avoid potential DOS when using QEMU pseudo random number generator (bsc#970036)
- CVE-2016-2857: Fixed OOB access when processing IP checksums (bsc#970037)
- CVE-2016-4001: Fixed OOB access in Stellaris enet emulated nic (bsc#975128)
- CVE-2016-4002: Fixed OOB access in MIPSnet emulated controller (bsc#975136)
- CVE-2016-4020: Fixed possible host data leakage to guest from TPR access (bsc#975700)
- CVE-2015-3214: Fixed OOB read in i8254 PIC (bsc#934069)
- CVE-2014-9718: Fixed the handling of malformed or short ide PRDTs to avoid any opportunity for guest to cause DoS by abusing that interface (bsc#928393)
- CVE-2014-3689: Fixed insufficient parameter validation in rectangle functions (bsc#901508)
- CVE-2014-3615: The VGA emulator in QEMU allowed local guest users to read host memory by setting the display to a high resolution (bsc#895528).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
- CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989).
- CVE-2015-5279: Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU allowed guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets (bsc#945987).
- CVE-2015-5745: Buffer overflow in virtio-serial (bsc#940929).
- CVE-2015-6855: hw/ide/core.c in QEMU did not properly restrict the commands accepted by an ATAPI device, which allowed guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash (bsc#945404).
- CVE-2015-7295: hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allowed remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface (bsc#947159).
- CVE-2015-7549: PCI null pointer dereferences (bsc#958917).
- CVE-2015-8504: VNC floating point exception (bsc#958491).
- CVE-2015-8558: Infinite loop in ehci_advance_state resulting in DoS (bsc#959005).
- CVE-2015-8613: Wrong sized memset in megasas command handler (bsc#961358).
- CVE-2015-8619: Potential DoS for long HMP sendkey command argument (bsc#960334).
- CVE-2015-8743: OOB memory access in ne2000 ioport r/w functions (bsc#960725).
- CVE-2016-1568: AHCI use-after-free in aio port commands (bsc#961332).
- CVE-2016-1714: Potential OOB memory access in processing firmware configuration (bsc#961691).
- CVE-2016-1922: NULL pointer dereference when processing hmp i/o command (bsc#962320).
- CVE-2016-1981: Potential DoS (infinite loop) in e1000 device emulation by malicious privileged user within guest (bsc#963782).
- CVE-2016-2198: Malicious privileged guest user were able to cause DoS by writing to read-only EHCI capabilities registers (bsc#964413).
This non-security issue was fixed:
- Fix case of IDE interface needing busy status set before flush (bsc#936132)
Patchnames
slessp3-kvm-12634
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kvm", "title": "Title of the patch" }, { "category": "description", "text": "kvm was updated to fix 33 security issues.\n\nThese security issues were fixed:\n- CVE-2016-4439: Avoid OOB access in 53C9X emulation (bsc#980711)\n- CVE-2016-4441: Avoid OOB access in 53C9X emulation (bsc#980723)\n- CVE-2016-3710: Fixed VGA emulation based OOB access with potential for guest escape (bsc#978158)\n- CVE-2016-3712: Fixed VGa emulation based DOS and OOB read access exploit (bsc#978160)\n- CVE-2016-4037: Fixed USB ehci based DOS (bsc#976109) \n- CVE-2016-2538: Fixed potential OOB access in USB net device emulation (bsc#967969)\n- CVE-2016-2841: Fixed OOB access / hang in ne2000 emulation (bsc#969350)\n- CVE-2016-2858: Avoid potential DOS when using QEMU pseudo random number generator (bsc#970036)\n- CVE-2016-2857: Fixed OOB access when processing IP checksums (bsc#970037)\n- CVE-2016-4001: Fixed OOB access in Stellaris enet emulated nic (bsc#975128)\n- CVE-2016-4002: Fixed OOB access in MIPSnet emulated controller (bsc#975136)\n- CVE-2016-4020: Fixed possible host data leakage to guest from TPR access (bsc#975700)\n- CVE-2015-3214: Fixed OOB read in i8254 PIC (bsc#934069)\n- CVE-2014-9718: Fixed the handling of malformed or short ide PRDTs to avoid any opportunity for guest to cause DoS by abusing that interface (bsc#928393)\n- CVE-2014-3689: Fixed insufficient parameter validation in rectangle functions (bsc#901508)\n- CVE-2014-3615: The VGA emulator in QEMU allowed local guest users to read host memory by setting the display to a high resolution (bsc#895528).\n- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).\n- CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989).\n- CVE-2015-5279: Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU allowed guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets (bsc#945987).\n- CVE-2015-5745: Buffer overflow in virtio-serial (bsc#940929).\n- CVE-2015-6855: hw/ide/core.c in QEMU did not properly restrict the commands accepted by an ATAPI device, which allowed guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash (bsc#945404).\n- CVE-2015-7295: hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allowed remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface (bsc#947159).\n- CVE-2015-7549: PCI null pointer dereferences (bsc#958917).\n- CVE-2015-8504: VNC floating point exception (bsc#958491).\n- CVE-2015-8558: Infinite loop in ehci_advance_state resulting in DoS (bsc#959005).\n- CVE-2015-8613: Wrong sized memset in megasas command handler (bsc#961358).\n- CVE-2015-8619: Potential DoS for long HMP sendkey command argument (bsc#960334).\n- CVE-2015-8743: OOB memory access in ne2000 ioport r/w functions (bsc#960725).\n- CVE-2016-1568: AHCI use-after-free in aio port commands (bsc#961332).\n- CVE-2016-1714: Potential OOB memory access in processing firmware configuration (bsc#961691).\n- CVE-2016-1922: NULL pointer dereference when processing hmp i/o command (bsc#962320).\n- CVE-2016-1981: Potential DoS (infinite loop) in e1000 device emulation by malicious privileged user within guest (bsc#963782).\n- CVE-2016-2198: Malicious privileged guest user were able to cause DoS by writing to read-only EHCI capabilities registers (bsc#964413).\n\nThis non-security issue was fixed:\n- Fix case of IDE interface needing busy status set before flush (bsc#936132)\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp3-kvm-12634", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1698-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1698-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161698-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1698-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" }, { "category": "self", "summary": "SUSE Bug 895528", "url": "https://bugzilla.suse.com/895528" }, { "category": "self", "summary": "SUSE Bug 901508", "url": "https://bugzilla.suse.com/901508" }, { "category": "self", "summary": "SUSE Bug 928393", "url": "https://bugzilla.suse.com/928393" }, { "category": "self", "summary": "SUSE Bug 934069", "url": "https://bugzilla.suse.com/934069" }, { "category": "self", "summary": "SUSE Bug 936132", "url": "https://bugzilla.suse.com/936132" }, { "category": "self", "summary": "SUSE Bug 940929", "url": "https://bugzilla.suse.com/940929" }, { "category": "self", "summary": "SUSE Bug 944463", "url": "https://bugzilla.suse.com/944463" }, { "category": "self", "summary": "SUSE Bug 945404", "url": "https://bugzilla.suse.com/945404" }, { "category": "self", "summary": "SUSE Bug 945987", "url": "https://bugzilla.suse.com/945987" }, { "category": "self", "summary": "SUSE Bug 945989", "url": "https://bugzilla.suse.com/945989" }, { "category": "self", "summary": "SUSE Bug 947159", "url": "https://bugzilla.suse.com/947159" }, { "category": "self", "summary": "SUSE Bug 958491", "url": "https://bugzilla.suse.com/958491" }, { "category": "self", "summary": "SUSE Bug 958917", "url": "https://bugzilla.suse.com/958917" }, { "category": "self", "summary": "SUSE Bug 959005", "url": "https://bugzilla.suse.com/959005" }, { "category": "self", "summary": "SUSE Bug 960334", "url": "https://bugzilla.suse.com/960334" }, { "category": "self", "summary": "SUSE Bug 960725", "url": "https://bugzilla.suse.com/960725" }, { "category": "self", "summary": "SUSE Bug 961332", "url": "https://bugzilla.suse.com/961332" }, { "category": "self", "summary": "SUSE Bug 961333", "url": "https://bugzilla.suse.com/961333" }, { "category": "self", "summary": "SUSE Bug 961358", "url": "https://bugzilla.suse.com/961358" }, { "category": "self", "summary": "SUSE Bug 961556", "url": "https://bugzilla.suse.com/961556" }, { "category": "self", "summary": "SUSE Bug 961691", "url": "https://bugzilla.suse.com/961691" }, { "category": "self", "summary": "SUSE Bug 962320", "url": "https://bugzilla.suse.com/962320" }, { "category": "self", "summary": "SUSE Bug 963782", "url": "https://bugzilla.suse.com/963782" }, { "category": "self", "summary": "SUSE Bug 964413", "url": "https://bugzilla.suse.com/964413" }, { "category": "self", "summary": "SUSE Bug 967969", "url": "https://bugzilla.suse.com/967969" }, { "category": "self", "summary": "SUSE Bug 969350", "url": "https://bugzilla.suse.com/969350" }, { "category": "self", "summary": "SUSE Bug 970036", "url": "https://bugzilla.suse.com/970036" }, { "category": "self", "summary": "SUSE Bug 970037", "url": "https://bugzilla.suse.com/970037" }, { "category": "self", "summary": "SUSE Bug 975128", "url": "https://bugzilla.suse.com/975128" }, { "category": "self", "summary": "SUSE Bug 975136", "url": "https://bugzilla.suse.com/975136" }, { "category": "self", "summary": "SUSE Bug 975700", "url": "https://bugzilla.suse.com/975700" }, { "category": "self", "summary": "SUSE Bug 976109", "url": "https://bugzilla.suse.com/976109" }, { "category": "self", "summary": "SUSE Bug 978158", "url": "https://bugzilla.suse.com/978158" }, { "category": "self", "summary": "SUSE Bug 978160", "url": "https://bugzilla.suse.com/978160" }, { "category": "self", "summary": "SUSE Bug 980711", "url": "https://bugzilla.suse.com/980711" }, { "category": "self", "summary": "SUSE Bug 980723", "url": "https://bugzilla.suse.com/980723" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3615 page", "url": "https://www.suse.com/security/cve/CVE-2014-3615/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3689 page", "url": "https://www.suse.com/security/cve/CVE-2014-3689/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9718 page", "url": "https://www.suse.com/security/cve/CVE-2014-9718/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3214 page", "url": "https://www.suse.com/security/cve/CVE-2015-3214/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5239 page", "url": "https://www.suse.com/security/cve/CVE-2015-5239/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5278 page", "url": "https://www.suse.com/security/cve/CVE-2015-5278/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5279 page", "url": "https://www.suse.com/security/cve/CVE-2015-5279/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5745 page", "url": "https://www.suse.com/security/cve/CVE-2015-5745/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6855 page", "url": "https://www.suse.com/security/cve/CVE-2015-6855/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7295 page", "url": "https://www.suse.com/security/cve/CVE-2015-7295/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7549 page", "url": "https://www.suse.com/security/cve/CVE-2015-7549/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8504 page", "url": "https://www.suse.com/security/cve/CVE-2015-8504/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8558 page", "url": "https://www.suse.com/security/cve/CVE-2015-8558/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8613 page", "url": "https://www.suse.com/security/cve/CVE-2015-8613/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8619 page", "url": "https://www.suse.com/security/cve/CVE-2015-8619/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8743 page", "url": "https://www.suse.com/security/cve/CVE-2015-8743/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1568 page", "url": "https://www.suse.com/security/cve/CVE-2016-1568/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1714 page", "url": "https://www.suse.com/security/cve/CVE-2016-1714/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1922 page", "url": "https://www.suse.com/security/cve/CVE-2016-1922/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1981 page", "url": "https://www.suse.com/security/cve/CVE-2016-1981/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2198 page", "url": "https://www.suse.com/security/cve/CVE-2016-2198/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2538 page", "url": "https://www.suse.com/security/cve/CVE-2016-2538/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2841 page", "url": "https://www.suse.com/security/cve/CVE-2016-2841/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2857 page", "url": "https://www.suse.com/security/cve/CVE-2016-2857/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2858 page", "url": "https://www.suse.com/security/cve/CVE-2016-2858/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3710 page", "url": "https://www.suse.com/security/cve/CVE-2016-3710/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3712 page", "url": "https://www.suse.com/security/cve/CVE-2016-3712/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4001 page", "url": "https://www.suse.com/security/cve/CVE-2016-4001/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4002 page", "url": "https://www.suse.com/security/cve/CVE-2016-4002/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4020 page", "url": "https://www.suse.com/security/cve/CVE-2016-4020/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4037 page", "url": "https://www.suse.com/security/cve/CVE-2016-4037/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4439 page", "url": "https://www.suse.com/security/cve/CVE-2016-4439/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4441 page", "url": "https://www.suse.com/security/cve/CVE-2016-4441/" } ], "title": "Security update for kvm", "tracking": { "current_release_date": "2016-06-28T14:31:01Z", "generator": { "date": "2016-06-28T14:31:01Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1698-1", "initial_release_date": "2016-06-28T14:31:01Z", "revision_history": [ { "date": "2016-06-28T14:31:01Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kvm-1.4.2-46.1.i586", "product": { "name": "kvm-1.4.2-46.1.i586", "product_id": "kvm-1.4.2-46.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kvm-1.4.2-46.1.s390x", "product": { "name": "kvm-1.4.2-46.1.s390x", "product_id": "kvm-1.4.2-46.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kvm-1.4.2-46.1.x86_64", "product": { "name": "kvm-1.4.2-46.1.x86_64", "product_id": "kvm-1.4.2-46.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-46.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586" }, "product_reference": "kvm-1.4.2-46.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-46.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x" }, "product_reference": "kvm-1.4.2-46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-46.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64" }, "product_reference": "kvm-1.4.2-46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-46.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586" }, "product_reference": "kvm-1.4.2-46.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-46.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x" }, "product_reference": "kvm-1.4.2-46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-46.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" }, "product_reference": "kvm-1.4.2-46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-3615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3615" } ], "notes": [ { "category": "general", "text": "The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3615", "url": "https://www.suse.com/security/cve/CVE-2014-3615" }, { "category": "external", "summary": "SUSE Bug 895528 for CVE-2014-3615", "url": "https://bugzilla.suse.com/895528" }, { "category": "external", "summary": "SUSE Bug 918998 for CVE-2014-3615", "url": "https://bugzilla.suse.com/918998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "moderate" } ], "title": "CVE-2014-3615" }, { "cve": "CVE-2014-3689", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3689" } ], "notes": [ { "category": "general", "text": "The vmware-vga driver (hw/display/vmware_vga.c) in QEMU allows local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3689", "url": "https://www.suse.com/security/cve/CVE-2014-3689" }, { "category": "external", "summary": "SUSE Bug 1072223 for CVE-2014-3689", "url": "https://bugzilla.suse.com/1072223" }, { "category": "external", "summary": "SUSE Bug 1189862 for CVE-2014-3689", "url": "https://bugzilla.suse.com/1189862" }, { "category": "external", "summary": "SUSE Bug 901508 for CVE-2014-3689", "url": "https://bugzilla.suse.com/901508" }, { "category": "external", "summary": "SUSE Bug 962611 for CVE-2014-3689", "url": "https://bugzilla.suse.com/962611" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "important" } ], "title": "CVE-2014-3689" }, { "cve": "CVE-2014-9718", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9718" } ], "notes": [ { "category": "general", "text": "The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality in QEMU 1.0 through 2.1.3 have multiple interpretations of a function\u0027s return value, which allows guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related to the bmdma_prepare_buf and ahci_dma_prepare_buf functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9718", "url": "https://www.suse.com/security/cve/CVE-2014-9718" }, { "category": "external", "summary": "SUSE Bug 928393 for CVE-2014-9718", "url": "https://bugzilla.suse.com/928393" }, { "category": "external", "summary": "SUSE Bug 964431 for CVE-2014-9718", "url": "https://bugzilla.suse.com/964431" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "moderate" } ], "title": "CVE-2014-9718" }, { "cve": "CVE-2015-3214", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3214" } ], "notes": [ { "category": "general", "text": "The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3214", "url": "https://www.suse.com/security/cve/CVE-2015-3214" }, { "category": "external", "summary": "SUSE Bug 934069 for CVE-2015-3214", "url": "https://bugzilla.suse.com/934069" }, { "category": "external", "summary": "SUSE Bug 936025 for CVE-2015-3214", "url": "https://bugzilla.suse.com/936025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "moderate" } ], "title": "CVE-2015-3214" }, { "cve": "CVE-2015-5239", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5239" } ], "notes": [ { "category": "general", "text": "Integer overflow in the VNC display driver in QEMU before 2.1.0 allows attachers to cause a denial of service (process crash) via a CLIENT_CUT_TEXT message, which triggers an infinite loop.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5239", "url": "https://www.suse.com/security/cve/CVE-2015-5239" }, { "category": "external", "summary": "SUSE Bug 944463 for CVE-2015-5239", "url": "https://bugzilla.suse.com/944463" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2015-5239", "url": "https://bugzilla.suse.com/950367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "moderate" } ], "title": "CVE-2015-5239" }, { "cve": "CVE-2015-5278", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5278" } ], "notes": [ { "category": "general", "text": "The ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows attackers to cause a denial of service (infinite loop and instance crash) or possibly execute arbitrary code via vectors related to receiving packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5278", "url": "https://www.suse.com/security/cve/CVE-2015-5278" }, { "category": "external", "summary": "SUSE Bug 945989 for CVE-2015-5278", "url": "https://bugzilla.suse.com/945989" }, { "category": "external", "summary": "SUSE Bug 964947 for CVE-2015-5278", "url": "https://bugzilla.suse.com/964947" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "moderate" } ], "title": "CVE-2015-5278" }, { "cve": "CVE-2015-5279", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5279" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5279", "url": "https://www.suse.com/security/cve/CVE-2015-5279" }, { "category": "external", "summary": "SUSE Bug 945987 for CVE-2015-5279", "url": "https://bugzilla.suse.com/945987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "important" } ], "title": "CVE-2015-5279" }, { "cve": "CVE-2015-5745", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5745" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU before 2.4.0 allows guest users to cause a denial of service (QEMU process crash) via a crafted virtio control message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5745", "url": "https://www.suse.com/security/cve/CVE-2015-5745" }, { "category": "external", "summary": "SUSE Bug 940929 for CVE-2015-5745", "url": "https://bugzilla.suse.com/940929" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2015-5745", "url": "https://bugzilla.suse.com/950367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "low" } ], "title": "CVE-2015-5745" }, { "cve": "CVE-2015-6855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6855" } ], "notes": [ { "category": "general", "text": "hw/ide/core.c in QEMU does not properly restrict the commands accepted by an ATAPI device, which allows guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6855", "url": "https://www.suse.com/security/cve/CVE-2015-6855" }, { "category": "external", "summary": "SUSE Bug 945404 for CVE-2015-6855", "url": "https://bugzilla.suse.com/945404" }, { "category": "external", "summary": "SUSE Bug 965156 for CVE-2015-6855", "url": "https://bugzilla.suse.com/965156" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "important" } ], "title": "CVE-2015-6855" }, { "cve": "CVE-2015-7295", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7295" } ], "notes": [ { "category": "general", "text": "hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allows remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7295", "url": "https://www.suse.com/security/cve/CVE-2015-7295" }, { "category": "external", "summary": "SUSE Bug 947159 for CVE-2015-7295", "url": "https://bugzilla.suse.com/947159" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2015-7295", "url": "https://bugzilla.suse.com/950367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "moderate" } ], "title": "CVE-2015-7295" }, { "cve": "CVE-2015-7549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7549" } ], "notes": [ { "category": "general", "text": "The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7549", "url": "https://www.suse.com/security/cve/CVE-2015-7549" }, { "category": "external", "summary": "SUSE Bug 958917 for CVE-2015-7549", "url": "https://bugzilla.suse.com/958917" }, { "category": "external", "summary": "SUSE Bug 958918 for CVE-2015-7549", "url": "https://bugzilla.suse.com/958918" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "low" } ], "title": "CVE-2015-7549" }, { "cve": "CVE-2015-8504", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8504" } ], "notes": [ { "category": "general", "text": "Qemu, when built with VNC display driver support, allows remote attackers to cause a denial of service (arithmetic exception and application crash) via crafted SetPixelFormat messages from a client.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8504", "url": "https://www.suse.com/security/cve/CVE-2015-8504" }, { "category": "external", "summary": "SUSE Bug 958491 for CVE-2015-8504", "url": "https://bugzilla.suse.com/958491" }, { "category": "external", "summary": "SUSE Bug 958493 for CVE-2015-8504", "url": "https://bugzilla.suse.com/958493" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "moderate" } ], "title": "CVE-2015-8504" }, { "cve": "CVE-2015-8558", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8558" } ], "notes": [ { "category": "general", "text": "The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8558", "url": "https://www.suse.com/security/cve/CVE-2015-8558" }, { "category": "external", "summary": "SUSE Bug 959005 for CVE-2015-8558", "url": "https://bugzilla.suse.com/959005" }, { "category": "external", "summary": "SUSE Bug 959006 for CVE-2015-8558", "url": "https://bugzilla.suse.com/959006" }, { "category": "external", "summary": "SUSE Bug 976109 for CVE-2015-8558", "url": "https://bugzilla.suse.com/976109" }, { "category": "external", "summary": "SUSE Bug 976111 for CVE-2015-8558", "url": "https://bugzilla.suse.com/976111" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "moderate" } ], "title": "CVE-2015-8558" }, { "cve": "CVE-2015-8613", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8613" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest users to cause a denial of service (QEMU instance crash) via a crafted SCSI controller CTRL_GET_INFO command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8613", "url": "https://www.suse.com/security/cve/CVE-2015-8613" }, { "category": "external", "summary": "SUSE Bug 961358 for CVE-2015-8613", "url": "https://bugzilla.suse.com/961358" }, { "category": "external", "summary": "SUSE Bug 961556 for CVE-2015-8613", "url": "https://bugzilla.suse.com/961556" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "moderate" } ], "title": "CVE-2015-8613" }, { "cve": "CVE-2015-8619", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8619" } ], "notes": [ { "category": "general", "text": "The Human Monitor Interface support in QEMU allows remote attackers to cause a denial of service (out-of-bounds write and application crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8619", "url": "https://www.suse.com/security/cve/CVE-2015-8619" }, { "category": "external", "summary": "SUSE Bug 960334 for CVE-2015-8619", "url": "https://bugzilla.suse.com/960334" }, { "category": "external", "summary": "SUSE Bug 965269 for CVE-2015-8619", "url": "https://bugzilla.suse.com/965269" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "important" } ], "title": "CVE-2015-8619" }, { "cve": "CVE-2015-8743", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8743" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing \u0027ioport\u0027 r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8743", "url": "https://www.suse.com/security/cve/CVE-2015-8743" }, { "category": "external", "summary": "SUSE Bug 960725 for CVE-2015-8743", "url": "https://bugzilla.suse.com/960725" }, { "category": "external", "summary": "SUSE Bug 960726 for CVE-2015-8743", "url": "https://bugzilla.suse.com/960726" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "moderate" } ], "title": "CVE-2015-8743" }, { "cve": "CVE-2016-1568", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1568" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1568", "url": "https://www.suse.com/security/cve/CVE-2016-1568" }, { "category": "external", "summary": "SUSE Bug 961332 for CVE-2016-1568", "url": "https://bugzilla.suse.com/961332" }, { "category": "external", "summary": "SUSE Bug 961333 for CVE-2016-1568", "url": "https://bugzilla.suse.com/961333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "moderate" } ], "title": "CVE-2016-1568" }, { "cve": "CVE-2016-1714", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1714" } ], "notes": [ { "category": "general", "text": "The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1714", "url": "https://www.suse.com/security/cve/CVE-2016-1714" }, { "category": "external", "summary": "SUSE Bug 961691 for CVE-2016-1714", "url": "https://bugzilla.suse.com/961691" }, { "category": "external", "summary": "SUSE Bug 961692 for CVE-2016-1714", "url": "https://bugzilla.suse.com/961692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "moderate" } ], "title": "CVE-2016-1714" }, { "cve": "CVE-2016-1922", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1922" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, \u0027current_cpu\u0027 remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1922", "url": "https://www.suse.com/security/cve/CVE-2016-1922" }, { "category": "external", "summary": "SUSE Bug 962320 for CVE-2016-1922", "url": "https://bugzilla.suse.com/962320" }, { "category": "external", "summary": "SUSE Bug 962321 for CVE-2016-1922", "url": "https://bugzilla.suse.com/962321" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "low" } ], "title": "CVE-2016-1922" }, { "cve": "CVE-2016-1981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1981" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1981", "url": "https://www.suse.com/security/cve/CVE-2016-1981" }, { "category": "external", "summary": "SUSE Bug 963782 for CVE-2016-1981", "url": "https://bugzilla.suse.com/963782" }, { "category": "external", "summary": "SUSE Bug 963783 for CVE-2016-1981", "url": "https://bugzilla.suse.com/963783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "low" } ], "title": "CVE-2016-1981" }, { "cve": "CVE-2016-2198", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2198" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) built with the USB EHCI emulation support is vulnerable to a null pointer dereference flaw. It could occur when an application attempts to write to EHCI capabilities registers. A privileged user inside quest could use this flaw to crash the QEMU process instance resulting in DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2198", "url": "https://www.suse.com/security/cve/CVE-2016-2198" }, { "category": "external", "summary": "SUSE Bug 964413 for CVE-2016-2198", "url": "https://bugzilla.suse.com/964413" }, { "category": "external", "summary": "SUSE Bug 964415 for CVE-2016-2198", "url": "https://bugzilla.suse.com/964415" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "low" } ], "title": "CVE-2016-2198" }, { "cve": "CVE-2016-2538", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2538" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 allow local guest OS administrators to cause a denial of service (QEMU process crash) or obtain sensitive host memory information via a remote NDIS control message packet that is mishandled in the (1) rndis_query_response, (2) rndis_set_response, or (3) usb_net_handle_dataout function.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2538", "url": "https://www.suse.com/security/cve/CVE-2016-2538" }, { "category": "external", "summary": "SUSE Bug 967969 for CVE-2016-2538", "url": "https://bugzilla.suse.com/967969" }, { "category": "external", "summary": "SUSE Bug 968004 for CVE-2016-2538", "url": "https://bugzilla.suse.com/968004" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "important" } ], "title": "CVE-2016-2538" }, { "cve": "CVE-2016-2841", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2841" } ], "notes": [ { "category": "general", "text": "The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) in QEMU before 2.5.1 allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2841", "url": "https://www.suse.com/security/cve/CVE-2016-2841" }, { "category": "external", "summary": "SUSE Bug 969350 for CVE-2016-2841", "url": "https://bugzilla.suse.com/969350" }, { "category": "external", "summary": "SUSE Bug 969351 for CVE-2016-2841", "url": "https://bugzilla.suse.com/969351" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "low" } ], "title": "CVE-2016-2841" }, { "cve": "CVE-2016-2857", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2857" } ], "notes": [ { "category": "general", "text": "The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2857", "url": "https://www.suse.com/security/cve/CVE-2016-2857" }, { "category": "external", "summary": "SUSE Bug 970037 for CVE-2016-2857", "url": "https://bugzilla.suse.com/970037" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "low" } ], "title": "CVE-2016-2857" }, { "cve": "CVE-2016-2858", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2858" } ], "notes": [ { "category": "general", "text": "QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2858", "url": "https://www.suse.com/security/cve/CVE-2016-2858" }, { "category": "external", "summary": "SUSE Bug 970036 for CVE-2016-2858", "url": "https://bugzilla.suse.com/970036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "low" } ], "title": "CVE-2016-2858" }, { "cve": "CVE-2016-3710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3710" } ], "notes": [ { "category": "general", "text": "The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \"Dark Portal\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3710", "url": "https://www.suse.com/security/cve/CVE-2016-3710" }, { "category": "external", "summary": "SUSE Bug 978158 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978158" }, { "category": "external", "summary": "SUSE Bug 978164 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978164" }, { "category": "external", "summary": "SUSE Bug 978167 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978167" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "moderate" } ], "title": "CVE-2016-3710" }, { "cve": "CVE-2016-3712", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3712" } ], "notes": [ { "category": "general", "text": "Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3712", "url": "https://www.suse.com/security/cve/CVE-2016-3712" }, { "category": "external", "summary": "SUSE Bug 978160 for CVE-2016-3712", "url": "https://bugzilla.suse.com/978160" }, { "category": "external", "summary": "SUSE Bug 978164 for CVE-2016-3712", "url": "https://bugzilla.suse.com/978164" }, { "category": "external", "summary": "SUSE Bug 978167 for CVE-2016-3712", "url": "https://bugzilla.suse.com/978167" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "low" } ], "title": "CVE-2016-3712" }, { "cve": "CVE-2016-4001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4001" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4001", "url": "https://www.suse.com/security/cve/CVE-2016-4001" }, { "category": "external", "summary": "SUSE Bug 975128 for CVE-2016-4001", "url": "https://bugzilla.suse.com/975128" }, { "category": "external", "summary": "SUSE Bug 975130 for CVE-2016-4001", "url": "https://bugzilla.suse.com/975130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "moderate" } ], "title": "CVE-2016-4001" }, { "cve": "CVE-2016-4002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4002" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4002", "url": "https://www.suse.com/security/cve/CVE-2016-4002" }, { "category": "external", "summary": "SUSE Bug 975136 for CVE-2016-4002", "url": "https://bugzilla.suse.com/975136" }, { "category": "external", "summary": "SUSE Bug 975138 for CVE-2016-4002", "url": "https://bugzilla.suse.com/975138" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "moderate" } ], "title": "CVE-2016-4002" }, { "cve": "CVE-2016-4020", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4020" } ], "notes": [ { "category": "general", "text": "The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4020", "url": "https://www.suse.com/security/cve/CVE-2016-4020" }, { "category": "external", "summary": "SUSE Bug 975700 for CVE-2016-4020", "url": "https://bugzilla.suse.com/975700" }, { "category": "external", "summary": "SUSE Bug 975907 for CVE-2016-4020", "url": "https://bugzilla.suse.com/975907" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "low" } ], "title": "CVE-2016-4020" }, { "cve": "CVE-2016-4037", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4037" } ], "notes": [ { "category": "general", "text": "The ehci_advance_state function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list, a related issue to CVE-2015-8558.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4037", "url": "https://www.suse.com/security/cve/CVE-2016-4037" }, { "category": "external", "summary": "SUSE Bug 959005 for CVE-2016-4037", "url": "https://bugzilla.suse.com/959005" }, { "category": "external", "summary": "SUSE Bug 959006 for CVE-2016-4037", "url": "https://bugzilla.suse.com/959006" }, { "category": "external", "summary": "SUSE Bug 976109 for CVE-2016-4037", "url": "https://bugzilla.suse.com/976109" }, { "category": "external", "summary": "SUSE Bug 976111 for CVE-2016-4037", "url": "https://bugzilla.suse.com/976111" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "low" } ], "title": "CVE-2016-4037" }, { "cve": "CVE-2016-4439", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4439" } ], "notes": [ { "category": "general", "text": "The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4439", "url": "https://www.suse.com/security/cve/CVE-2016-4439" }, { "category": "external", "summary": "SUSE Bug 980711 for CVE-2016-4439", "url": "https://bugzilla.suse.com/980711" }, { "category": "external", "summary": "SUSE Bug 980716 for CVE-2016-4439", "url": "https://bugzilla.suse.com/980716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "low" } ], "title": "CVE-2016-4439" }, { "cve": "CVE-2016-4441", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4441" } ], "notes": [ { "category": "general", "text": "The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4441", "url": "https://www.suse.com/security/cve/CVE-2016-4441" }, { "category": "external", "summary": "SUSE Bug 980723 for CVE-2016-4441", "url": "https://bugzilla.suse.com/980723" }, { "category": "external", "summary": "SUSE Bug 980724 for CVE-2016-4441", "url": "https://bugzilla.suse.com/980724" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-46.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T14:31:01Z", "details": "low" } ], "title": "CVE-2016-4441" } ] }
suse-su-2016:1785-1
Vulnerability from csaf_suse
Published
2016-07-11 11:31
Modified
2016-07-11 11:31
Summary
Security update for kvm
Notes
Title of the patch
Security update for kvm
Description of the patch
kvm was updated to fix 33 security issues.
These security issues were fixed:
- CVE-2016-4439: Avoid OOB access in 53C9X emulation (bsc#980711)
- CVE-2016-4441: Avoid OOB access in 53C9X emulation (bsc#980723)
- CVE-2016-3710: Fixed VGA emulation based OOB access with potential for guest escape (bsc#978158)
- CVE-2016-3712: Fixed VGa emulation based DOS and OOB read access exploit (bsc#978160)
- CVE-2016-4037: Fixed USB ehci based DOS (bsc#976109)
- CVE-2016-2538: Fixed potential OOB access in USB net device emulation (bsc#967969)
- CVE-2016-2841: Fixed OOB access / hang in ne2000 emulation (bsc#969350)
- CVE-2016-2858: Avoid potential DOS when using QEMU pseudo random number generator (bsc#970036)
- CVE-2016-2857: Fixed OOB access when processing IP checksums (bsc#970037)
- CVE-2016-4001: Fixed OOB access in Stellaris enet emulated nic (bsc#975128)
- CVE-2016-4002: Fixed OOB access in MIPSnet emulated controller (bsc#975136)
- CVE-2016-4020: Fixed possible host data leakage to guest from TPR access (bsc#975700)
- CVE-2015-3214: Fixed OOB read in i8254 PIC (bsc#934069)
- CVE-2014-9718: Fixed the handling of malformed or short ide PRDTs to avoid any opportunity for guest to cause DoS by abusing that interface (bsc#928393)
- CVE-2014-3689: Fixed insufficient parameter validation in rectangle functions (bsc#901508)
- CVE-2014-3615: The VGA emulator in QEMU allowed local guest users to read host memory by setting the display to a high resolution (bsc#895528).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
- CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989).
- CVE-2015-5279: Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU allowed guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets (bsc#945987).
- CVE-2015-5745: Buffer overflow in virtio-serial (bsc#940929).
- CVE-2015-6855: hw/ide/core.c in QEMU did not properly restrict the commands accepted by an ATAPI device, which allowed guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash (bsc#945404).
- CVE-2015-7295: hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allowed remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface (bsc#947159).
- CVE-2015-7549: PCI null pointer dereferences (bsc#958917).
- CVE-2015-8504: VNC floating point exception (bsc#958491).
- CVE-2015-8558: Infinite loop in ehci_advance_state resulting in DoS (bsc#959005).
- CVE-2015-8613: Wrong sized memset in megasas command handler (bsc#961358).
- CVE-2015-8619: Potential DoS for long HMP sendkey command argument (bsc#960334).
- CVE-2015-8743: OOB memory access in ne2000 ioport r/w functions (bsc#960725).
- CVE-2016-1568: AHCI use-after-free in aio port commands (bsc#961332).
- CVE-2016-1714: Potential OOB memory access in processing firmware configuration (bsc#961691).
- CVE-2016-1922: NULL pointer dereference when processing hmp i/o command (bsc#962320).
- CVE-2016-1981: Potential DoS (infinite loop) in e1000 device emulation by malicious privileged user within guest (bsc#963782).
- CVE-2016-2198: Malicious privileged guest user were able to cause DoS by writing to read-only EHCI capabilities registers (bsc#964413).
This non-security issue was fixed:
- Fix case of IDE interface needing busy status set before flush (bsc#936132)
Patchnames
slessp4-kvm-12645
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kvm", "title": "Title of the patch" }, { "category": "description", "text": "kvm was updated to fix 33 security issues.\n\nThese security issues were fixed:\n- CVE-2016-4439: Avoid OOB access in 53C9X emulation (bsc#980711)\n- CVE-2016-4441: Avoid OOB access in 53C9X emulation (bsc#980723)\n- CVE-2016-3710: Fixed VGA emulation based OOB access with potential for guest escape (bsc#978158)\n- CVE-2016-3712: Fixed VGa emulation based DOS and OOB read access exploit (bsc#978160)\n- CVE-2016-4037: Fixed USB ehci based DOS (bsc#976109)\n- CVE-2016-2538: Fixed potential OOB access in USB net device emulation (bsc#967969)\n- CVE-2016-2841: Fixed OOB access / hang in ne2000 emulation (bsc#969350)\n- CVE-2016-2858: Avoid potential DOS when using QEMU pseudo random number generator (bsc#970036)\n- CVE-2016-2857: Fixed OOB access when processing IP checksums (bsc#970037)\n- CVE-2016-4001: Fixed OOB access in Stellaris enet emulated nic (bsc#975128)\n- CVE-2016-4002: Fixed OOB access in MIPSnet emulated controller (bsc#975136)\n- CVE-2016-4020: Fixed possible host data leakage to guest from TPR access (bsc#975700)\n- CVE-2015-3214: Fixed OOB read in i8254 PIC (bsc#934069)\n- CVE-2014-9718: Fixed the handling of malformed or short ide PRDTs to avoid any opportunity for guest to cause DoS by abusing that interface (bsc#928393)\n- CVE-2014-3689: Fixed insufficient parameter validation in rectangle functions (bsc#901508)\n- CVE-2014-3615: The VGA emulator in QEMU allowed local guest users to read host memory by setting the display to a high resolution (bsc#895528).\n- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).\n- CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989).\n- CVE-2015-5279: Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU allowed guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets (bsc#945987).\n- CVE-2015-5745: Buffer overflow in virtio-serial (bsc#940929).\n- CVE-2015-6855: hw/ide/core.c in QEMU did not properly restrict the commands accepted by an ATAPI device, which allowed guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash (bsc#945404).\n- CVE-2015-7295: hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allowed remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface (bsc#947159).\n- CVE-2015-7549: PCI null pointer dereferences (bsc#958917).\n- CVE-2015-8504: VNC floating point exception (bsc#958491).\n- CVE-2015-8558: Infinite loop in ehci_advance_state resulting in DoS (bsc#959005).\n- CVE-2015-8613: Wrong sized memset in megasas command handler (bsc#961358).\n- CVE-2015-8619: Potential DoS for long HMP sendkey command argument (bsc#960334).\n- CVE-2015-8743: OOB memory access in ne2000 ioport r/w functions (bsc#960725).\n- CVE-2016-1568: AHCI use-after-free in aio port commands (bsc#961332).\n- CVE-2016-1714: Potential OOB memory access in processing firmware configuration (bsc#961691).\n- CVE-2016-1922: NULL pointer dereference when processing hmp i/o command (bsc#962320).\n- CVE-2016-1981: Potential DoS (infinite loop) in e1000 device emulation by malicious privileged user within guest (bsc#963782).\n- CVE-2016-2198: Malicious privileged guest user were able to cause DoS by writing to read-only EHCI capabilities registers (bsc#964413).\n\nThis non-security issue was fixed:\n- Fix case of IDE interface needing busy status set before flush (bsc#936132)\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp4-kvm-12645", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1785-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1785-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161785-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1785-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" }, { "category": "self", "summary": "SUSE Bug 895528", "url": "https://bugzilla.suse.com/895528" }, { "category": "self", "summary": "SUSE Bug 901508", "url": "https://bugzilla.suse.com/901508" }, { "category": "self", "summary": "SUSE Bug 928393", "url": "https://bugzilla.suse.com/928393" }, { "category": "self", "summary": "SUSE Bug 934069", "url": "https://bugzilla.suse.com/934069" }, { "category": "self", "summary": "SUSE Bug 936132", "url": "https://bugzilla.suse.com/936132" }, { "category": "self", "summary": "SUSE Bug 940929", "url": "https://bugzilla.suse.com/940929" }, { "category": "self", "summary": "SUSE Bug 944463", "url": "https://bugzilla.suse.com/944463" }, { "category": "self", "summary": "SUSE Bug 945404", "url": "https://bugzilla.suse.com/945404" }, { "category": "self", "summary": "SUSE Bug 945987", "url": "https://bugzilla.suse.com/945987" }, { "category": "self", "summary": "SUSE Bug 945989", "url": "https://bugzilla.suse.com/945989" }, { "category": "self", "summary": "SUSE Bug 947159", "url": "https://bugzilla.suse.com/947159" }, { "category": "self", "summary": "SUSE Bug 958491", "url": "https://bugzilla.suse.com/958491" }, { "category": "self", "summary": "SUSE Bug 958917", "url": "https://bugzilla.suse.com/958917" }, { "category": "self", "summary": "SUSE Bug 959005", "url": "https://bugzilla.suse.com/959005" }, { "category": "self", "summary": "SUSE Bug 960334", "url": "https://bugzilla.suse.com/960334" }, { "category": "self", "summary": "SUSE Bug 960725", "url": "https://bugzilla.suse.com/960725" }, { "category": "self", "summary": "SUSE Bug 961332", "url": "https://bugzilla.suse.com/961332" }, { "category": "self", "summary": "SUSE Bug 961333", "url": "https://bugzilla.suse.com/961333" }, { "category": "self", "summary": "SUSE Bug 961358", "url": "https://bugzilla.suse.com/961358" }, { "category": "self", "summary": "SUSE Bug 961556", "url": "https://bugzilla.suse.com/961556" }, { "category": "self", "summary": "SUSE Bug 961691", "url": "https://bugzilla.suse.com/961691" }, { "category": "self", "summary": "SUSE Bug 962320", "url": "https://bugzilla.suse.com/962320" }, { "category": "self", "summary": "SUSE Bug 963782", "url": "https://bugzilla.suse.com/963782" }, { "category": "self", "summary": "SUSE Bug 964413", "url": "https://bugzilla.suse.com/964413" }, { "category": "self", "summary": "SUSE Bug 967969", "url": "https://bugzilla.suse.com/967969" }, { "category": "self", "summary": "SUSE Bug 969350", "url": "https://bugzilla.suse.com/969350" }, { "category": "self", "summary": "SUSE Bug 970036", "url": "https://bugzilla.suse.com/970036" }, { "category": "self", "summary": "SUSE Bug 970037", "url": "https://bugzilla.suse.com/970037" }, { "category": "self", "summary": "SUSE Bug 975128", "url": "https://bugzilla.suse.com/975128" }, { "category": "self", "summary": "SUSE Bug 975136", "url": "https://bugzilla.suse.com/975136" }, { "category": "self", "summary": "SUSE Bug 975700", "url": "https://bugzilla.suse.com/975700" }, { "category": "self", "summary": "SUSE Bug 976109", "url": "https://bugzilla.suse.com/976109" }, { "category": "self", "summary": "SUSE Bug 978158", "url": "https://bugzilla.suse.com/978158" }, { "category": "self", "summary": "SUSE Bug 978160", "url": "https://bugzilla.suse.com/978160" }, { "category": "self", "summary": "SUSE Bug 980711", "url": "https://bugzilla.suse.com/980711" }, { "category": "self", "summary": "SUSE Bug 980723", "url": "https://bugzilla.suse.com/980723" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3615 page", "url": "https://www.suse.com/security/cve/CVE-2014-3615/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3689 page", "url": "https://www.suse.com/security/cve/CVE-2014-3689/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9718 page", "url": "https://www.suse.com/security/cve/CVE-2014-9718/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3214 page", "url": "https://www.suse.com/security/cve/CVE-2015-3214/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5239 page", "url": "https://www.suse.com/security/cve/CVE-2015-5239/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5278 page", "url": "https://www.suse.com/security/cve/CVE-2015-5278/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5279 page", "url": "https://www.suse.com/security/cve/CVE-2015-5279/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5745 page", "url": "https://www.suse.com/security/cve/CVE-2015-5745/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6855 page", "url": "https://www.suse.com/security/cve/CVE-2015-6855/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7295 page", "url": "https://www.suse.com/security/cve/CVE-2015-7295/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7549 page", "url": "https://www.suse.com/security/cve/CVE-2015-7549/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8504 page", "url": "https://www.suse.com/security/cve/CVE-2015-8504/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8558 page", "url": "https://www.suse.com/security/cve/CVE-2015-8558/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8613 page", "url": "https://www.suse.com/security/cve/CVE-2015-8613/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8619 page", "url": "https://www.suse.com/security/cve/CVE-2015-8619/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8743 page", "url": "https://www.suse.com/security/cve/CVE-2015-8743/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1568 page", "url": "https://www.suse.com/security/cve/CVE-2016-1568/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1714 page", "url": "https://www.suse.com/security/cve/CVE-2016-1714/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1922 page", "url": "https://www.suse.com/security/cve/CVE-2016-1922/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1981 page", "url": "https://www.suse.com/security/cve/CVE-2016-1981/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2198 page", "url": "https://www.suse.com/security/cve/CVE-2016-2198/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2538 page", "url": "https://www.suse.com/security/cve/CVE-2016-2538/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2841 page", "url": "https://www.suse.com/security/cve/CVE-2016-2841/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2857 page", "url": "https://www.suse.com/security/cve/CVE-2016-2857/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2858 page", "url": "https://www.suse.com/security/cve/CVE-2016-2858/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3710 page", "url": "https://www.suse.com/security/cve/CVE-2016-3710/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3712 page", "url": "https://www.suse.com/security/cve/CVE-2016-3712/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4001 page", "url": "https://www.suse.com/security/cve/CVE-2016-4001/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4002 page", "url": "https://www.suse.com/security/cve/CVE-2016-4002/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4020 page", "url": "https://www.suse.com/security/cve/CVE-2016-4020/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4037 page", "url": "https://www.suse.com/security/cve/CVE-2016-4037/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4439 page", "url": "https://www.suse.com/security/cve/CVE-2016-4439/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4441 page", "url": "https://www.suse.com/security/cve/CVE-2016-4441/" } ], "title": "Security update for kvm", "tracking": { "current_release_date": "2016-07-11T11:31:17Z", "generator": { "date": "2016-07-11T11:31:17Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1785-1", "initial_release_date": "2016-07-11T11:31:17Z", "revision_history": [ { "date": "2016-07-11T11:31:17Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kvm-1.4.2-44.1.i586", "product": { "name": "kvm-1.4.2-44.1.i586", "product_id": "kvm-1.4.2-44.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kvm-1.4.2-44.1.s390x", "product": { "name": "kvm-1.4.2-44.1.s390x", "product_id": "kvm-1.4.2-44.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kvm-1.4.2-44.1.x86_64", "product": { "name": "kvm-1.4.2-44.1.x86_64", "product_id": "kvm-1.4.2-44.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-44.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586" }, "product_reference": "kvm-1.4.2-44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-44.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x" }, "product_reference": "kvm-1.4.2-44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64" }, "product_reference": "kvm-1.4.2-44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-44.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586" }, "product_reference": "kvm-1.4.2-44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-44.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x" }, "product_reference": "kvm-1.4.2-44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-1.4.2-44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" }, "product_reference": "kvm-1.4.2-44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-3615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3615" } ], "notes": [ { "category": "general", "text": "The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3615", "url": "https://www.suse.com/security/cve/CVE-2014-3615" }, { "category": "external", "summary": "SUSE Bug 895528 for CVE-2014-3615", "url": "https://bugzilla.suse.com/895528" }, { "category": "external", "summary": "SUSE Bug 918998 for CVE-2014-3615", "url": "https://bugzilla.suse.com/918998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "moderate" } ], "title": "CVE-2014-3615" }, { "cve": "CVE-2014-3689", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3689" } ], "notes": [ { "category": "general", "text": "The vmware-vga driver (hw/display/vmware_vga.c) in QEMU allows local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3689", "url": "https://www.suse.com/security/cve/CVE-2014-3689" }, { "category": "external", "summary": "SUSE Bug 1072223 for CVE-2014-3689", "url": "https://bugzilla.suse.com/1072223" }, { "category": "external", "summary": "SUSE Bug 1189862 for CVE-2014-3689", "url": "https://bugzilla.suse.com/1189862" }, { "category": "external", "summary": "SUSE Bug 901508 for CVE-2014-3689", "url": "https://bugzilla.suse.com/901508" }, { "category": "external", "summary": "SUSE Bug 962611 for CVE-2014-3689", "url": "https://bugzilla.suse.com/962611" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "important" } ], "title": "CVE-2014-3689" }, { "cve": "CVE-2014-9718", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9718" } ], "notes": [ { "category": "general", "text": "The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality in QEMU 1.0 through 2.1.3 have multiple interpretations of a function\u0027s return value, which allows guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related to the bmdma_prepare_buf and ahci_dma_prepare_buf functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9718", "url": "https://www.suse.com/security/cve/CVE-2014-9718" }, { "category": "external", "summary": "SUSE Bug 928393 for CVE-2014-9718", "url": "https://bugzilla.suse.com/928393" }, { "category": "external", "summary": "SUSE Bug 964431 for CVE-2014-9718", "url": "https://bugzilla.suse.com/964431" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "moderate" } ], "title": "CVE-2014-9718" }, { "cve": "CVE-2015-3214", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3214" } ], "notes": [ { "category": "general", "text": "The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3214", "url": "https://www.suse.com/security/cve/CVE-2015-3214" }, { "category": "external", "summary": "SUSE Bug 934069 for CVE-2015-3214", "url": "https://bugzilla.suse.com/934069" }, { "category": "external", "summary": "SUSE Bug 936025 for CVE-2015-3214", "url": "https://bugzilla.suse.com/936025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "moderate" } ], "title": "CVE-2015-3214" }, { "cve": "CVE-2015-5239", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5239" } ], "notes": [ { "category": "general", "text": "Integer overflow in the VNC display driver in QEMU before 2.1.0 allows attachers to cause a denial of service (process crash) via a CLIENT_CUT_TEXT message, which triggers an infinite loop.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5239", "url": "https://www.suse.com/security/cve/CVE-2015-5239" }, { "category": "external", "summary": "SUSE Bug 944463 for CVE-2015-5239", "url": "https://bugzilla.suse.com/944463" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2015-5239", "url": "https://bugzilla.suse.com/950367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "moderate" } ], "title": "CVE-2015-5239" }, { "cve": "CVE-2015-5278", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5278" } ], "notes": [ { "category": "general", "text": "The ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows attackers to cause a denial of service (infinite loop and instance crash) or possibly execute arbitrary code via vectors related to receiving packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5278", "url": "https://www.suse.com/security/cve/CVE-2015-5278" }, { "category": "external", "summary": "SUSE Bug 945989 for CVE-2015-5278", "url": "https://bugzilla.suse.com/945989" }, { "category": "external", "summary": "SUSE Bug 964947 for CVE-2015-5278", "url": "https://bugzilla.suse.com/964947" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "moderate" } ], "title": "CVE-2015-5278" }, { "cve": "CVE-2015-5279", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5279" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5279", "url": "https://www.suse.com/security/cve/CVE-2015-5279" }, { "category": "external", "summary": "SUSE Bug 945987 for CVE-2015-5279", "url": "https://bugzilla.suse.com/945987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "important" } ], "title": "CVE-2015-5279" }, { "cve": "CVE-2015-5745", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5745" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU before 2.4.0 allows guest users to cause a denial of service (QEMU process crash) via a crafted virtio control message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5745", "url": "https://www.suse.com/security/cve/CVE-2015-5745" }, { "category": "external", "summary": "SUSE Bug 940929 for CVE-2015-5745", "url": "https://bugzilla.suse.com/940929" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2015-5745", "url": "https://bugzilla.suse.com/950367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "low" } ], "title": "CVE-2015-5745" }, { "cve": "CVE-2015-6855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6855" } ], "notes": [ { "category": "general", "text": "hw/ide/core.c in QEMU does not properly restrict the commands accepted by an ATAPI device, which allows guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6855", "url": "https://www.suse.com/security/cve/CVE-2015-6855" }, { "category": "external", "summary": "SUSE Bug 945404 for CVE-2015-6855", "url": "https://bugzilla.suse.com/945404" }, { "category": "external", "summary": "SUSE Bug 965156 for CVE-2015-6855", "url": "https://bugzilla.suse.com/965156" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "important" } ], "title": "CVE-2015-6855" }, { "cve": "CVE-2015-7295", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7295" } ], "notes": [ { "category": "general", "text": "hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allows remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7295", "url": "https://www.suse.com/security/cve/CVE-2015-7295" }, { "category": "external", "summary": "SUSE Bug 947159 for CVE-2015-7295", "url": "https://bugzilla.suse.com/947159" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2015-7295", "url": "https://bugzilla.suse.com/950367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "moderate" } ], "title": "CVE-2015-7295" }, { "cve": "CVE-2015-7549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7549" } ], "notes": [ { "category": "general", "text": "The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7549", "url": "https://www.suse.com/security/cve/CVE-2015-7549" }, { "category": "external", "summary": "SUSE Bug 958917 for CVE-2015-7549", "url": "https://bugzilla.suse.com/958917" }, { "category": "external", "summary": "SUSE Bug 958918 for CVE-2015-7549", "url": "https://bugzilla.suse.com/958918" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "low" } ], "title": "CVE-2015-7549" }, { "cve": "CVE-2015-8504", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8504" } ], "notes": [ { "category": "general", "text": "Qemu, when built with VNC display driver support, allows remote attackers to cause a denial of service (arithmetic exception and application crash) via crafted SetPixelFormat messages from a client.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8504", "url": "https://www.suse.com/security/cve/CVE-2015-8504" }, { "category": "external", "summary": "SUSE Bug 958491 for CVE-2015-8504", "url": "https://bugzilla.suse.com/958491" }, { "category": "external", "summary": "SUSE Bug 958493 for CVE-2015-8504", "url": "https://bugzilla.suse.com/958493" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "moderate" } ], "title": "CVE-2015-8504" }, { "cve": "CVE-2015-8558", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8558" } ], "notes": [ { "category": "general", "text": "The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8558", "url": "https://www.suse.com/security/cve/CVE-2015-8558" }, { "category": "external", "summary": "SUSE Bug 959005 for CVE-2015-8558", "url": "https://bugzilla.suse.com/959005" }, { "category": "external", "summary": "SUSE Bug 959006 for CVE-2015-8558", "url": "https://bugzilla.suse.com/959006" }, { "category": "external", "summary": "SUSE Bug 976109 for CVE-2015-8558", "url": "https://bugzilla.suse.com/976109" }, { "category": "external", "summary": "SUSE Bug 976111 for CVE-2015-8558", "url": "https://bugzilla.suse.com/976111" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "moderate" } ], "title": "CVE-2015-8558" }, { "cve": "CVE-2015-8613", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8613" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest users to cause a denial of service (QEMU instance crash) via a crafted SCSI controller CTRL_GET_INFO command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8613", "url": "https://www.suse.com/security/cve/CVE-2015-8613" }, { "category": "external", "summary": "SUSE Bug 961358 for CVE-2015-8613", "url": "https://bugzilla.suse.com/961358" }, { "category": "external", "summary": "SUSE Bug 961556 for CVE-2015-8613", "url": "https://bugzilla.suse.com/961556" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "moderate" } ], "title": "CVE-2015-8613" }, { "cve": "CVE-2015-8619", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8619" } ], "notes": [ { "category": "general", "text": "The Human Monitor Interface support in QEMU allows remote attackers to cause a denial of service (out-of-bounds write and application crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8619", "url": "https://www.suse.com/security/cve/CVE-2015-8619" }, { "category": "external", "summary": "SUSE Bug 960334 for CVE-2015-8619", "url": "https://bugzilla.suse.com/960334" }, { "category": "external", "summary": "SUSE Bug 965269 for CVE-2015-8619", "url": "https://bugzilla.suse.com/965269" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "important" } ], "title": "CVE-2015-8619" }, { "cve": "CVE-2015-8743", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8743" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing \u0027ioport\u0027 r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8743", "url": "https://www.suse.com/security/cve/CVE-2015-8743" }, { "category": "external", "summary": "SUSE Bug 960725 for CVE-2015-8743", "url": "https://bugzilla.suse.com/960725" }, { "category": "external", "summary": "SUSE Bug 960726 for CVE-2015-8743", "url": "https://bugzilla.suse.com/960726" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "moderate" } ], "title": "CVE-2015-8743" }, { "cve": "CVE-2016-1568", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1568" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1568", "url": "https://www.suse.com/security/cve/CVE-2016-1568" }, { "category": "external", "summary": "SUSE Bug 961332 for CVE-2016-1568", "url": "https://bugzilla.suse.com/961332" }, { "category": "external", "summary": "SUSE Bug 961333 for CVE-2016-1568", "url": "https://bugzilla.suse.com/961333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "moderate" } ], "title": "CVE-2016-1568" }, { "cve": "CVE-2016-1714", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1714" } ], "notes": [ { "category": "general", "text": "The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1714", "url": "https://www.suse.com/security/cve/CVE-2016-1714" }, { "category": "external", "summary": "SUSE Bug 961691 for CVE-2016-1714", "url": "https://bugzilla.suse.com/961691" }, { "category": "external", "summary": "SUSE Bug 961692 for CVE-2016-1714", "url": "https://bugzilla.suse.com/961692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "moderate" } ], "title": "CVE-2016-1714" }, { "cve": "CVE-2016-1922", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1922" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, \u0027current_cpu\u0027 remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1922", "url": "https://www.suse.com/security/cve/CVE-2016-1922" }, { "category": "external", "summary": "SUSE Bug 962320 for CVE-2016-1922", "url": "https://bugzilla.suse.com/962320" }, { "category": "external", "summary": "SUSE Bug 962321 for CVE-2016-1922", "url": "https://bugzilla.suse.com/962321" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "low" } ], "title": "CVE-2016-1922" }, { "cve": "CVE-2016-1981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1981" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1981", "url": "https://www.suse.com/security/cve/CVE-2016-1981" }, { "category": "external", "summary": "SUSE Bug 963782 for CVE-2016-1981", "url": "https://bugzilla.suse.com/963782" }, { "category": "external", "summary": "SUSE Bug 963783 for CVE-2016-1981", "url": "https://bugzilla.suse.com/963783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "low" } ], "title": "CVE-2016-1981" }, { "cve": "CVE-2016-2198", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2198" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) built with the USB EHCI emulation support is vulnerable to a null pointer dereference flaw. It could occur when an application attempts to write to EHCI capabilities registers. A privileged user inside quest could use this flaw to crash the QEMU process instance resulting in DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2198", "url": "https://www.suse.com/security/cve/CVE-2016-2198" }, { "category": "external", "summary": "SUSE Bug 964413 for CVE-2016-2198", "url": "https://bugzilla.suse.com/964413" }, { "category": "external", "summary": "SUSE Bug 964415 for CVE-2016-2198", "url": "https://bugzilla.suse.com/964415" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "low" } ], "title": "CVE-2016-2198" }, { "cve": "CVE-2016-2538", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2538" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 allow local guest OS administrators to cause a denial of service (QEMU process crash) or obtain sensitive host memory information via a remote NDIS control message packet that is mishandled in the (1) rndis_query_response, (2) rndis_set_response, or (3) usb_net_handle_dataout function.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2538", "url": "https://www.suse.com/security/cve/CVE-2016-2538" }, { "category": "external", "summary": "SUSE Bug 967969 for CVE-2016-2538", "url": "https://bugzilla.suse.com/967969" }, { "category": "external", "summary": "SUSE Bug 968004 for CVE-2016-2538", "url": "https://bugzilla.suse.com/968004" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "important" } ], "title": "CVE-2016-2538" }, { "cve": "CVE-2016-2841", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2841" } ], "notes": [ { "category": "general", "text": "The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) in QEMU before 2.5.1 allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2841", "url": "https://www.suse.com/security/cve/CVE-2016-2841" }, { "category": "external", "summary": "SUSE Bug 969350 for CVE-2016-2841", "url": "https://bugzilla.suse.com/969350" }, { "category": "external", "summary": "SUSE Bug 969351 for CVE-2016-2841", "url": "https://bugzilla.suse.com/969351" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "low" } ], "title": "CVE-2016-2841" }, { "cve": "CVE-2016-2857", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2857" } ], "notes": [ { "category": "general", "text": "The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2857", "url": "https://www.suse.com/security/cve/CVE-2016-2857" }, { "category": "external", "summary": "SUSE Bug 970037 for CVE-2016-2857", "url": "https://bugzilla.suse.com/970037" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "low" } ], "title": "CVE-2016-2857" }, { "cve": "CVE-2016-2858", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2858" } ], "notes": [ { "category": "general", "text": "QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2858", "url": "https://www.suse.com/security/cve/CVE-2016-2858" }, { "category": "external", "summary": "SUSE Bug 970036 for CVE-2016-2858", "url": "https://bugzilla.suse.com/970036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "low" } ], "title": "CVE-2016-2858" }, { "cve": "CVE-2016-3710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3710" } ], "notes": [ { "category": "general", "text": "The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \"Dark Portal\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3710", "url": "https://www.suse.com/security/cve/CVE-2016-3710" }, { "category": "external", "summary": "SUSE Bug 978158 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978158" }, { "category": "external", "summary": "SUSE Bug 978164 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978164" }, { "category": "external", "summary": "SUSE Bug 978167 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978167" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "moderate" } ], "title": "CVE-2016-3710" }, { "cve": "CVE-2016-3712", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3712" } ], "notes": [ { "category": "general", "text": "Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3712", "url": "https://www.suse.com/security/cve/CVE-2016-3712" }, { "category": "external", "summary": "SUSE Bug 978160 for CVE-2016-3712", "url": "https://bugzilla.suse.com/978160" }, { "category": "external", "summary": "SUSE Bug 978164 for CVE-2016-3712", "url": "https://bugzilla.suse.com/978164" }, { "category": "external", "summary": "SUSE Bug 978167 for CVE-2016-3712", "url": "https://bugzilla.suse.com/978167" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "low" } ], "title": "CVE-2016-3712" }, { "cve": "CVE-2016-4001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4001" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4001", "url": "https://www.suse.com/security/cve/CVE-2016-4001" }, { "category": "external", "summary": "SUSE Bug 975128 for CVE-2016-4001", "url": "https://bugzilla.suse.com/975128" }, { "category": "external", "summary": "SUSE Bug 975130 for CVE-2016-4001", "url": "https://bugzilla.suse.com/975130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "moderate" } ], "title": "CVE-2016-4001" }, { "cve": "CVE-2016-4002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4002" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4002", "url": "https://www.suse.com/security/cve/CVE-2016-4002" }, { "category": "external", "summary": "SUSE Bug 975136 for CVE-2016-4002", "url": "https://bugzilla.suse.com/975136" }, { "category": "external", "summary": "SUSE Bug 975138 for CVE-2016-4002", "url": "https://bugzilla.suse.com/975138" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "moderate" } ], "title": "CVE-2016-4002" }, { "cve": "CVE-2016-4020", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4020" } ], "notes": [ { "category": "general", "text": "The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4020", "url": "https://www.suse.com/security/cve/CVE-2016-4020" }, { "category": "external", "summary": "SUSE Bug 975700 for CVE-2016-4020", "url": "https://bugzilla.suse.com/975700" }, { "category": "external", "summary": "SUSE Bug 975907 for CVE-2016-4020", "url": "https://bugzilla.suse.com/975907" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "low" } ], "title": "CVE-2016-4020" }, { "cve": "CVE-2016-4037", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4037" } ], "notes": [ { "category": "general", "text": "The ehci_advance_state function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list, a related issue to CVE-2015-8558.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4037", "url": "https://www.suse.com/security/cve/CVE-2016-4037" }, { "category": "external", "summary": "SUSE Bug 959005 for CVE-2016-4037", "url": "https://bugzilla.suse.com/959005" }, { "category": "external", "summary": "SUSE Bug 959006 for CVE-2016-4037", "url": "https://bugzilla.suse.com/959006" }, { "category": "external", "summary": "SUSE Bug 976109 for CVE-2016-4037", "url": "https://bugzilla.suse.com/976109" }, { "category": "external", "summary": "SUSE Bug 976111 for CVE-2016-4037", "url": "https://bugzilla.suse.com/976111" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "low" } ], "title": "CVE-2016-4037" }, { "cve": "CVE-2016-4439", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4439" } ], "notes": [ { "category": "general", "text": "The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4439", "url": "https://www.suse.com/security/cve/CVE-2016-4439" }, { "category": "external", "summary": "SUSE Bug 980711 for CVE-2016-4439", "url": "https://bugzilla.suse.com/980711" }, { "category": "external", "summary": "SUSE Bug 980716 for CVE-2016-4439", "url": "https://bugzilla.suse.com/980716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "low" } ], "title": "CVE-2016-4439" }, { "cve": "CVE-2016-4441", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4441" } ], "notes": [ { "category": "general", "text": "The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4441", "url": "https://www.suse.com/security/cve/CVE-2016-4441" }, { "category": "external", "summary": "SUSE Bug 980723 for CVE-2016-4441", "url": "https://bugzilla.suse.com/980723" }, { "category": "external", "summary": "SUSE Bug 980724 for CVE-2016-4441", "url": "https://bugzilla.suse.com/980724" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-11T11:31:17Z", "details": "low" } ], "title": "CVE-2016-4441" } ] }
suse-su-2016:2093-1
Vulnerability from csaf_suse
Published
2016-08-17 12:22
Modified
2016-08-17 12:22
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen to version 4.5.3 fixes the several issues.
These security issues were fixed:
- CVE-2016-6258: Potential privilege escalation in PV guests (XSA-182) (bsc#988675).
- CVE-2016-6259: Missing SMAP whitelisting in 32-bit exception / event delivery (XSA-183) (bsc#988676).
- CVE-2016-5337: The megasas_ctrl_get_info function allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983973).
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the host via vectors related to the information transfer buffer (bsc#983984).
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960).
- CVE-2016-4453: The vmsvga_fifo_run function allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982225).
- CVE-2016-4454: The vmsvga_fifo_read_raw function allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggered an out-of-bounds read (bsc#982224).
- CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982286).
- CVE-2016-5105: Stack information leakage while reading configuration (bsc#982024).
- CVE-2016-5106: Out-of-bounds write while setting controller properties (bsc#982025).
- CVE-2016-5107: Out-of-bounds read in megasas_lookup_frame() function (bsc#982026).
- CVE-2016-4963: The libxl device-handling allowed local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore (bsc#979670).
- CVE-2016-4962: The libxl device-handling allowed local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled areas of xenstore (bsc#979620).
- CVE-2016-4952: Out-of-bounds access issue in pvsci_ring_init_msg/data routines (bsc#981276).
- CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264).
- CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724).
- CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716).
- CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the 'Dark Portal' issue (bsc#978164).
- CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038).
- CVE-2016-3159: The fpu_fxrstor function in arch/x86/i387.c did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188).
- CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188).
- CVE-2016-4037: The ehci_advance_state function in hw/usb/hcd-ehci.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list (bsc#976111).
- CVE-2016-4020: The patch_instruction function did not initialize the imm32 variable, which allowed local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR) (bsc#975907).
- CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130).
- CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138).
- bsc#978295: x86 software guest page walk PS bit handling flaw (XSA-176)
- CVE-2016-5403: virtio: unbounded memory allocation on host via guest leading to DoS (XSA-184) (bsc#990923)
- CVE-2016-6351: scsi: esp: OOB write access in esp_do_dma (bsc#990843)
These non-security issues were fixed:
- bsc#986586: Out of memory (oom) during boot on 'modprobe xenblk' (non xen kernel)
- bsc#900418: Dump cannot be performed on SLES12 XEN
- bsc#953339: Implement SUSE specific unplug protocol for emulated PCI devices in PVonHVM guests to qemu-xen-upstream
- bsc#953362: Implement SUSE specific unplug protocol for emulated PCI devices in PVonHVM guests to qemu-xen-upstream
- bsc#953518: Implement SUSE specific unplug protocol for emulated PCI devices in PVonHVM guests to qemu-xen-upstream
- bsc#984981: Implement SUSE specific unplug protocol for emulated PCI devices in PVonHVM guests to qemu-xen-upstream
- bsc#954872: Script block-dmmd not working as expected - libxl: error: libxl_dm.c (Additional fixes)
- bsc#982695: qemu fails to boot HVM guest from xvda
- bsc#958848: HVM guest crash at /usr/src/packages/BUILD/xen-4.4.2-testing/obj/default/balloon/balloon.c:407
- bsc#949889: Fail to install 32-bit paravirt VM under SLES12SP1Beta3 XEN
- bsc#954872: Script block-dmmd not working as expected - libxl: error: libxl_dm.c (another modification)
- bsc#961600: Poor performance when Xen HVM domU configured with max memory greater than current memory
- bsc#963161: Windows VM getting stuck during load while a VF is assigned to it after upgrading to latest maintenance updates
- bsc#976058: Xen error running simple HVM guest (Post Alpha 2 xen+qemu)
- bsc#973631: AWS EC2 kdump issue
- bsc#957986: Indirect descriptors are not compatible with Amazon block backend
- bsc#964427: Discarding device blocks: failed - Input/output error
- bsc#985503: Fixed vif-route
- bsc#978413: PV guest upgrade from SLES11 SP4 to SLES 12 SP2 alpha3 failed
Patchnames
SUSE-SLE-DESKTOP-12-SP1-2016-1238,SUSE-SLE-SDK-12-SP1-2016-1238,SUSE-SLE-SERVER-12-SP1-2016-1238
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen to version 4.5.3 fixes the several issues.\n\nThese security issues were fixed:\n\n- CVE-2016-6258: Potential privilege escalation in PV guests (XSA-182) (bsc#988675).\n- CVE-2016-6259: Missing SMAP whitelisting in 32-bit exception / event delivery (XSA-183) (bsc#988676).\n- CVE-2016-5337: The megasas_ctrl_get_info function allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983973).\n- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the host via vectors related to the information transfer buffer (bsc#983984).\n- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960).\n- CVE-2016-4453: The vmsvga_fifo_run function allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982225).\n- CVE-2016-4454: The vmsvga_fifo_read_raw function allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggered an out-of-bounds read (bsc#982224).\n- CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982286).\n- CVE-2016-5105: Stack information leakage while reading configuration (bsc#982024).\n- CVE-2016-5106: Out-of-bounds write while setting controller properties (bsc#982025).\n- CVE-2016-5107: Out-of-bounds read in megasas_lookup_frame() function (bsc#982026).\n- CVE-2016-4963: The libxl device-handling allowed local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore (bsc#979670).\n- CVE-2016-4962: The libxl device-handling allowed local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled areas of xenstore (bsc#979620).\n- CVE-2016-4952: Out-of-bounds access issue in pvsci_ring_init_msg/data routines (bsc#981276).\n- CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264).\n- CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724).\n- CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716).\n- CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \u0027Dark Portal\u0027 issue (bsc#978164).\n- CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038).\n- CVE-2016-3159: The fpu_fxrstor function in arch/x86/i387.c did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188).\n- CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188).\n- CVE-2016-4037: The ehci_advance_state function in hw/usb/hcd-ehci.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list (bsc#976111).\n- CVE-2016-4020: The patch_instruction function did not initialize the imm32 variable, which allowed local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR) (bsc#975907).\n- CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130).\n- CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138).\n- bsc#978295: x86 software guest page walk PS bit handling flaw (XSA-176)\n- CVE-2016-5403: virtio: unbounded memory allocation on host via guest leading to DoS (XSA-184) (bsc#990923)\n- CVE-2016-6351: scsi: esp: OOB write access in esp_do_dma (bsc#990843)\n\nThese non-security issues were fixed:\n\n- bsc#986586: Out of memory (oom) during boot on \u0027modprobe xenblk\u0027 (non xen kernel)\n- bsc#900418: Dump cannot be performed on SLES12 XEN\n- bsc#953339: Implement SUSE specific unplug protocol for emulated PCI devices in PVonHVM guests to qemu-xen-upstream\n- bsc#953362: Implement SUSE specific unplug protocol for emulated PCI devices in PVonHVM guests to qemu-xen-upstream\n- bsc#953518: Implement SUSE specific unplug protocol for emulated PCI devices in PVonHVM guests to qemu-xen-upstream\n- bsc#984981: Implement SUSE specific unplug protocol for emulated PCI devices in PVonHVM guests to qemu-xen-upstream\n- bsc#954872: Script block-dmmd not working as expected - libxl: error: libxl_dm.c (Additional fixes)\n- bsc#982695: qemu fails to boot HVM guest from xvda\n- bsc#958848: HVM guest crash at /usr/src/packages/BUILD/xen-4.4.2-testing/obj/default/balloon/balloon.c:407\n- bsc#949889: Fail to install 32-bit paravirt VM under SLES12SP1Beta3 XEN\n- bsc#954872: Script block-dmmd not working as expected - libxl: error: libxl_dm.c (another modification)\n- bsc#961600: Poor performance when Xen HVM domU configured with max memory greater than current memory\n- bsc#963161: Windows VM getting stuck during load while a VF is assigned to it after upgrading to latest maintenance updates\n- bsc#976058: Xen error running simple HVM guest (Post Alpha 2 xen+qemu)\n- bsc#973631: AWS EC2 kdump issue\n- bsc#957986: Indirect descriptors are not compatible with Amazon block backend\n- bsc#964427: Discarding device blocks: failed - Input/output error\n- bsc#985503: Fixed vif-route \n- bsc#978413: PV guest upgrade from SLES11 SP4 to SLES 12 SP2 alpha3 failed \n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP1-2016-1238,SUSE-SLE-SDK-12-SP1-2016-1238,SUSE-SLE-SERVER-12-SP1-2016-1238", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2093-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2093-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162093-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2093-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002214.html" }, { "category": "self", "summary": "SUSE Bug 900418", "url": "https://bugzilla.suse.com/900418" }, { "category": "self", "summary": "SUSE Bug 949889", "url": "https://bugzilla.suse.com/949889" }, { "category": "self", "summary": "SUSE Bug 953339", "url": "https://bugzilla.suse.com/953339" }, { "category": "self", "summary": "SUSE Bug 953362", "url": "https://bugzilla.suse.com/953362" }, { "category": "self", "summary": "SUSE Bug 953518", "url": "https://bugzilla.suse.com/953518" }, { "category": "self", "summary": "SUSE Bug 954872", "url": "https://bugzilla.suse.com/954872" }, { "category": "self", "summary": "SUSE Bug 957986", "url": "https://bugzilla.suse.com/957986" }, { "category": "self", "summary": "SUSE Bug 958848", "url": "https://bugzilla.suse.com/958848" }, { "category": "self", "summary": "SUSE Bug 961600", "url": "https://bugzilla.suse.com/961600" }, { "category": "self", "summary": "SUSE Bug 963161", "url": "https://bugzilla.suse.com/963161" }, { "category": "self", "summary": "SUSE Bug 964427", "url": "https://bugzilla.suse.com/964427" }, { "category": "self", "summary": "SUSE Bug 973188", "url": "https://bugzilla.suse.com/973188" }, { "category": "self", "summary": "SUSE Bug 973631", "url": "https://bugzilla.suse.com/973631" }, { "category": "self", "summary": "SUSE Bug 974038", "url": "https://bugzilla.suse.com/974038" }, { "category": "self", "summary": "SUSE Bug 975130", "url": "https://bugzilla.suse.com/975130" }, { "category": "self", "summary": "SUSE Bug 975138", "url": "https://bugzilla.suse.com/975138" }, { "category": "self", "summary": "SUSE Bug 975907", "url": "https://bugzilla.suse.com/975907" }, { "category": "self", "summary": "SUSE Bug 976058", "url": "https://bugzilla.suse.com/976058" }, { "category": "self", "summary": "SUSE Bug 976111", "url": "https://bugzilla.suse.com/976111" }, { "category": "self", "summary": "SUSE Bug 978164", "url": "https://bugzilla.suse.com/978164" }, { "category": "self", "summary": "SUSE Bug 978295", "url": "https://bugzilla.suse.com/978295" }, { "category": "self", "summary": "SUSE Bug 978413", "url": "https://bugzilla.suse.com/978413" }, { "category": "self", "summary": "SUSE Bug 979620", "url": "https://bugzilla.suse.com/979620" }, { "category": "self", "summary": "SUSE Bug 979670", "url": "https://bugzilla.suse.com/979670" }, { "category": "self", "summary": "SUSE Bug 980716", "url": "https://bugzilla.suse.com/980716" }, { "category": "self", "summary": "SUSE Bug 980724", "url": "https://bugzilla.suse.com/980724" }, { "category": "self", "summary": "SUSE Bug 981264", "url": "https://bugzilla.suse.com/981264" }, { "category": "self", "summary": "SUSE Bug 981276", "url": "https://bugzilla.suse.com/981276" }, { "category": "self", "summary": "SUSE Bug 982024", "url": "https://bugzilla.suse.com/982024" }, { "category": "self", "summary": "SUSE Bug 982025", "url": "https://bugzilla.suse.com/982025" }, { "category": "self", "summary": "SUSE Bug 982026", "url": "https://bugzilla.suse.com/982026" }, { "category": "self", "summary": "SUSE Bug 982224", "url": "https://bugzilla.suse.com/982224" }, { "category": "self", "summary": "SUSE Bug 982225", "url": "https://bugzilla.suse.com/982225" }, { "category": "self", "summary": "SUSE Bug 982286", "url": "https://bugzilla.suse.com/982286" }, { "category": "self", "summary": "SUSE Bug 982695", "url": "https://bugzilla.suse.com/982695" }, { "category": "self", "summary": "SUSE Bug 982960", "url": "https://bugzilla.suse.com/982960" }, { "category": "self", "summary": "SUSE Bug 983973", "url": "https://bugzilla.suse.com/983973" }, { "category": "self", "summary": "SUSE Bug 983984", "url": "https://bugzilla.suse.com/983984" }, { "category": "self", "summary": "SUSE Bug 984981", "url": "https://bugzilla.suse.com/984981" }, { "category": "self", "summary": "SUSE Bug 985503", "url": "https://bugzilla.suse.com/985503" }, { "category": "self", "summary": "SUSE Bug 986586", "url": "https://bugzilla.suse.com/986586" }, { "category": "self", "summary": "SUSE Bug 988675", "url": "https://bugzilla.suse.com/988675" }, { "category": "self", "summary": "SUSE Bug 988676", "url": "https://bugzilla.suse.com/988676" }, { "category": "self", "summary": "SUSE Bug 990843", "url": "https://bugzilla.suse.com/990843" }, { "category": "self", "summary": "SUSE Bug 990923", "url": "https://bugzilla.suse.com/990923" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3672 page", "url": "https://www.suse.com/security/cve/CVE-2014-3672/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3158 page", "url": "https://www.suse.com/security/cve/CVE-2016-3158/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3159 page", "url": "https://www.suse.com/security/cve/CVE-2016-3159/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3710 page", "url": "https://www.suse.com/security/cve/CVE-2016-3710/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3960 page", "url": "https://www.suse.com/security/cve/CVE-2016-3960/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4001 page", "url": "https://www.suse.com/security/cve/CVE-2016-4001/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4002 page", "url": "https://www.suse.com/security/cve/CVE-2016-4002/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4020 page", "url": "https://www.suse.com/security/cve/CVE-2016-4020/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4037 page", "url": "https://www.suse.com/security/cve/CVE-2016-4037/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4439 page", "url": "https://www.suse.com/security/cve/CVE-2016-4439/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4441 page", "url": "https://www.suse.com/security/cve/CVE-2016-4441/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4453 page", "url": "https://www.suse.com/security/cve/CVE-2016-4453/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4454 page", "url": "https://www.suse.com/security/cve/CVE-2016-4454/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4952 page", "url": "https://www.suse.com/security/cve/CVE-2016-4952/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4962 page", "url": "https://www.suse.com/security/cve/CVE-2016-4962/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4963 page", "url": "https://www.suse.com/security/cve/CVE-2016-4963/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5105 page", "url": "https://www.suse.com/security/cve/CVE-2016-5105/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5106 page", "url": "https://www.suse.com/security/cve/CVE-2016-5106/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5107 page", "url": "https://www.suse.com/security/cve/CVE-2016-5107/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5126 page", "url": "https://www.suse.com/security/cve/CVE-2016-5126/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5238 page", "url": "https://www.suse.com/security/cve/CVE-2016-5238/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5337 page", "url": "https://www.suse.com/security/cve/CVE-2016-5337/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5338 page", "url": "https://www.suse.com/security/cve/CVE-2016-5338/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5403 page", "url": "https://www.suse.com/security/cve/CVE-2016-5403/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6258 page", "url": "https://www.suse.com/security/cve/CVE-2016-6258/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6259 page", "url": "https://www.suse.com/security/cve/CVE-2016-6259/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6351 page", "url": "https://www.suse.com/security/cve/CVE-2016-6351/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2016-08-17T12:22:27Z", "generator": { "date": "2016-08-17T12:22:27Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2093-1", "initial_release_date": "2016-08-17T12:22:27Z", "revision_history": [ { "date": "2016-08-17T12:22:27Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.5.3_08-17.1.x86_64", "product": { "name": "xen-4.5.3_08-17.1.x86_64", "product_id": "xen-4.5.3_08-17.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "product": { "name": "xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "product_id": "xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.5.3_08-17.1.x86_64", "product": { "name": "xen-libs-4.5.3_08-17.1.x86_64", "product_id": "xen-libs-4.5.3_08-17.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.5.3_08-17.1.x86_64", "product": { "name": "xen-libs-32bit-4.5.3_08-17.1.x86_64", "product_id": "xen-libs-32bit-4.5.3_08-17.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.5.3_08-17.1.x86_64", "product": { "name": "xen-devel-4.5.3_08-17.1.x86_64", "product_id": "xen-devel-4.5.3_08-17.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.5.3_08-17.1.x86_64", "product": { "name": "xen-doc-html-4.5.3_08-17.1.x86_64", "product_id": "xen-doc-html-4.5.3_08-17.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.5.3_08-17.1.x86_64", "product": { "name": "xen-tools-4.5.3_08-17.1.x86_64", "product_id": "xen-tools-4.5.3_08-17.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.5.3_08-17.1.x86_64", "product": { "name": "xen-tools-domU-4.5.3_08-17.1.x86_64", "product_id": "xen-tools-domU-4.5.3_08-17.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.5.3_08-17.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64" }, "product_reference": "xen-4.5.3_08-17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64" }, "product_reference": "xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.5.3_08-17.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64" }, "product_reference": "xen-libs-4.5.3_08-17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.5.3_08-17.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64" }, "product_reference": "xen-libs-32bit-4.5.3_08-17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.5.3_08-17.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" }, "product_reference": "xen-devel-4.5.3_08-17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.5.3_08-17.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64" }, "product_reference": "xen-4.5.3_08-17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.5.3_08-17.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64" }, "product_reference": "xen-doc-html-4.5.3_08-17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64" }, "product_reference": "xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.5.3_08-17.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64" }, "product_reference": "xen-libs-4.5.3_08-17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.5.3_08-17.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64" }, "product_reference": "xen-libs-32bit-4.5.3_08-17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.5.3_08-17.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64" }, "product_reference": "xen-tools-4.5.3_08-17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.5.3_08-17.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64" }, "product_reference": "xen-tools-domU-4.5.3_08-17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.5.3_08-17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64" }, "product_reference": "xen-4.5.3_08-17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.5.3_08-17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64" }, "product_reference": "xen-doc-html-4.5.3_08-17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64" }, "product_reference": "xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.5.3_08-17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64" }, "product_reference": "xen-libs-4.5.3_08-17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.5.3_08-17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64" }, "product_reference": "xen-libs-32bit-4.5.3_08-17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.5.3_08-17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64" }, "product_reference": "xen-tools-4.5.3_08-17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.5.3_08-17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64" }, "product_reference": "xen-tools-domU-4.5.3_08-17.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-3672", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3672" } ], "notes": [ { "category": "general", "text": "The qemu implementation in libvirt before 1.3.0 and Xen allows local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3672", "url": "https://www.suse.com/security/cve/CVE-2014-3672" }, { "category": "external", "summary": "SUSE Bug 981264 for CVE-2014-3672", "url": "https://bugzilla.suse.com/981264" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "low" } ], "title": "CVE-2014-3672" }, { "cve": "CVE-2016-3158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3158" } ], "notes": [ { "category": "general", "text": "The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3158", "url": "https://www.suse.com/security/cve/CVE-2016-3158" }, { "category": "external", "summary": "SUSE Bug 973188 for CVE-2016-3158", "url": "https://bugzilla.suse.com/973188" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "low" } ], "title": "CVE-2016-3158" }, { "cve": "CVE-2016-3159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3159" } ], "notes": [ { "category": "general", "text": "The fpu_fxrstor function in arch/x86/i387.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3159", "url": "https://www.suse.com/security/cve/CVE-2016-3159" }, { "category": "external", "summary": "SUSE Bug 973188 for CVE-2016-3159", "url": "https://bugzilla.suse.com/973188" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "low" } ], "title": "CVE-2016-3159" }, { "cve": "CVE-2016-3710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3710" } ], "notes": [ { "category": "general", "text": "The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \"Dark Portal\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3710", "url": "https://www.suse.com/security/cve/CVE-2016-3710" }, { "category": "external", "summary": "SUSE Bug 978158 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978158" }, { "category": "external", "summary": "SUSE Bug 978164 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978164" }, { "category": "external", "summary": "SUSE Bug 978167 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978167" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "moderate" } ], "title": "CVE-2016-3710" }, { "cve": "CVE-2016-3960", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3960" } ], "notes": [ { "category": "general", "text": "Integer overflow in the x86 shadow pagetable code in Xen allows local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3960", "url": "https://www.suse.com/security/cve/CVE-2016-3960" }, { "category": "external", "summary": "SUSE Bug 1072223 for CVE-2016-3960", "url": "https://bugzilla.suse.com/1072223" }, { "category": "external", "summary": "SUSE Bug 974038 for CVE-2016-3960", "url": "https://bugzilla.suse.com/974038" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "important" } ], "title": "CVE-2016-3960" }, { "cve": "CVE-2016-4001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4001" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4001", "url": "https://www.suse.com/security/cve/CVE-2016-4001" }, { "category": "external", "summary": "SUSE Bug 975128 for CVE-2016-4001", "url": "https://bugzilla.suse.com/975128" }, { "category": "external", "summary": "SUSE Bug 975130 for CVE-2016-4001", "url": "https://bugzilla.suse.com/975130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "moderate" } ], "title": "CVE-2016-4001" }, { "cve": "CVE-2016-4002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4002" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4002", "url": "https://www.suse.com/security/cve/CVE-2016-4002" }, { "category": "external", "summary": "SUSE Bug 975136 for CVE-2016-4002", "url": "https://bugzilla.suse.com/975136" }, { "category": "external", "summary": "SUSE Bug 975138 for CVE-2016-4002", "url": "https://bugzilla.suse.com/975138" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "moderate" } ], "title": "CVE-2016-4002" }, { "cve": "CVE-2016-4020", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4020" } ], "notes": [ { "category": "general", "text": "The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4020", "url": "https://www.suse.com/security/cve/CVE-2016-4020" }, { "category": "external", "summary": "SUSE Bug 975700 for CVE-2016-4020", "url": "https://bugzilla.suse.com/975700" }, { "category": "external", "summary": "SUSE Bug 975907 for CVE-2016-4020", "url": "https://bugzilla.suse.com/975907" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "low" } ], "title": "CVE-2016-4020" }, { "cve": "CVE-2016-4037", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4037" } ], "notes": [ { "category": "general", "text": "The ehci_advance_state function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list, a related issue to CVE-2015-8558.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4037", "url": "https://www.suse.com/security/cve/CVE-2016-4037" }, { "category": "external", "summary": "SUSE Bug 959005 for CVE-2016-4037", "url": "https://bugzilla.suse.com/959005" }, { "category": "external", "summary": "SUSE Bug 959006 for CVE-2016-4037", "url": "https://bugzilla.suse.com/959006" }, { "category": "external", "summary": "SUSE Bug 976109 for CVE-2016-4037", "url": "https://bugzilla.suse.com/976109" }, { "category": "external", "summary": "SUSE Bug 976111 for CVE-2016-4037", "url": "https://bugzilla.suse.com/976111" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "low" } ], "title": "CVE-2016-4037" }, { "cve": "CVE-2016-4439", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4439" } ], "notes": [ { "category": "general", "text": "The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4439", "url": "https://www.suse.com/security/cve/CVE-2016-4439" }, { "category": "external", "summary": "SUSE Bug 980711 for CVE-2016-4439", "url": "https://bugzilla.suse.com/980711" }, { "category": "external", "summary": "SUSE Bug 980716 for CVE-2016-4439", "url": "https://bugzilla.suse.com/980716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "low" } ], "title": "CVE-2016-4439" }, { "cve": "CVE-2016-4441", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4441" } ], "notes": [ { "category": "general", "text": "The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4441", "url": "https://www.suse.com/security/cve/CVE-2016-4441" }, { "category": "external", "summary": "SUSE Bug 980723 for CVE-2016-4441", "url": "https://bugzilla.suse.com/980723" }, { "category": "external", "summary": "SUSE Bug 980724 for CVE-2016-4441", "url": "https://bugzilla.suse.com/980724" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "low" } ], "title": "CVE-2016-4441" }, { "cve": "CVE-2016-4453", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4453" } ], "notes": [ { "category": "general", "text": "The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4453", "url": "https://www.suse.com/security/cve/CVE-2016-4453" }, { "category": "external", "summary": "SUSE Bug 982223 for CVE-2016-4453", "url": "https://bugzilla.suse.com/982223" }, { "category": "external", "summary": "SUSE Bug 982225 for CVE-2016-4453", "url": "https://bugzilla.suse.com/982225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "low" } ], "title": "CVE-2016-4453" }, { "cve": "CVE-2016-4454", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4454" } ], "notes": [ { "category": "general", "text": "The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4454", "url": "https://www.suse.com/security/cve/CVE-2016-4454" }, { "category": "external", "summary": "SUSE Bug 982222 for CVE-2016-4454", "url": "https://bugzilla.suse.com/982222" }, { "category": "external", "summary": "SUSE Bug 982224 for CVE-2016-4454", "url": "https://bugzilla.suse.com/982224" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "low" } ], "title": "CVE-2016-4454" }, { "cve": "CVE-2016-4952", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4952" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator), when built with VMWARE PVSCSI paravirtual SCSI bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds array access) via vectors related to the (1) PVSCSI_CMD_SETUP_RINGS or (2) PVSCSI_CMD_SETUP_MSG_RING SCSI command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4952", "url": "https://www.suse.com/security/cve/CVE-2016-4952" }, { "category": "external", "summary": "SUSE Bug 981266 for CVE-2016-4952", "url": "https://bugzilla.suse.com/981266" }, { "category": "external", "summary": "SUSE Bug 981276 for CVE-2016-4952", "url": "https://bugzilla.suse.com/981276" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "low" } ], "title": "CVE-2016-4952" }, { "cve": "CVE-2016-4962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4962" } ], "notes": [ { "category": "general", "text": "The libxl device-handling in Xen 4.6.x and earlier allows local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled areas of xenstore.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4962", "url": "https://www.suse.com/security/cve/CVE-2016-4962" }, { "category": "external", "summary": "SUSE Bug 979620 for CVE-2016-4962", "url": "https://bugzilla.suse.com/979620" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "moderate" } ], "title": "CVE-2016-4962" }, { "cve": "CVE-2016-4963", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4963" } ], "notes": [ { "category": "general", "text": "The libxl device-handling in Xen through 4.6.x allows local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4963", "url": "https://www.suse.com/security/cve/CVE-2016-4963" }, { "category": "external", "summary": "SUSE Bug 979641 for CVE-2016-4963", "url": "https://bugzilla.suse.com/979641" }, { "category": "external", "summary": "SUSE Bug 979670 for CVE-2016-4963", "url": "https://bugzilla.suse.com/979670" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "low" } ], "title": "CVE-2016-4963" }, { "cve": "CVE-2016-5105", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5105" } ], "notes": [ { "category": "general", "text": "The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, uses an uninitialized variable, which allows local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5105", "url": "https://www.suse.com/security/cve/CVE-2016-5105" }, { "category": "external", "summary": "SUSE Bug 982017 for CVE-2016-5105", "url": "https://bugzilla.suse.com/982017" }, { "category": "external", "summary": "SUSE Bug 982024 for CVE-2016-5105", "url": "https://bugzilla.suse.com/982024" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "low" } ], "title": "CVE-2016-5105" }, { "cve": "CVE-2016-5106", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5106" } ], "notes": [ { "category": "general", "text": "The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5106", "url": "https://www.suse.com/security/cve/CVE-2016-5106" }, { "category": "external", "summary": "SUSE Bug 982018 for CVE-2016-5106", "url": "https://bugzilla.suse.com/982018" }, { "category": "external", "summary": "SUSE Bug 982025 for CVE-2016-5106", "url": "https://bugzilla.suse.com/982025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "low" } ], "title": "CVE-2016-5106" }, { "cve": "CVE-2016-5107", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5107" } ], "notes": [ { "category": "general", "text": "The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5107", "url": "https://www.suse.com/security/cve/CVE-2016-5107" }, { "category": "external", "summary": "SUSE Bug 982019 for CVE-2016-5107", "url": "https://bugzilla.suse.com/982019" }, { "category": "external", "summary": "SUSE Bug 982026 for CVE-2016-5107", "url": "https://bugzilla.suse.com/982026" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "low" } ], "title": "CVE-2016-5107" }, { "cve": "CVE-2016-5126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5126" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5126", "url": "https://www.suse.com/security/cve/CVE-2016-5126" }, { "category": "external", "summary": "SUSE Bug 982285 for CVE-2016-5126", "url": "https://bugzilla.suse.com/982285" }, { "category": "external", "summary": "SUSE Bug 982286 for CVE-2016-5126", "url": "https://bugzilla.suse.com/982286" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "low" } ], "title": "CVE-2016-5126" }, { "cve": "CVE-2016-5238", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5238" } ], "notes": [ { "category": "general", "text": "The get_cmd function in hw/scsi/esp.c in QEMU might allow local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5238", "url": "https://www.suse.com/security/cve/CVE-2016-5238" }, { "category": "external", "summary": "SUSE Bug 982959 for CVE-2016-5238", "url": "https://bugzilla.suse.com/982959" }, { "category": "external", "summary": "SUSE Bug 982960 for CVE-2016-5238", "url": "https://bugzilla.suse.com/982960" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "moderate" } ], "title": "CVE-2016-5238" }, { "cve": "CVE-2016-5337", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5337" } ], "notes": [ { "category": "general", "text": "The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5337", "url": "https://www.suse.com/security/cve/CVE-2016-5337" }, { "category": "external", "summary": "SUSE Bug 983961 for CVE-2016-5337", "url": "https://bugzilla.suse.com/983961" }, { "category": "external", "summary": "SUSE Bug 983973 for CVE-2016-5337", "url": "https://bugzilla.suse.com/983973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "low" } ], "title": "CVE-2016-5337" }, { "cve": "CVE-2016-5338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5338" } ], "notes": [ { "category": "general", "text": "The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5338", "url": "https://www.suse.com/security/cve/CVE-2016-5338" }, { "category": "external", "summary": "SUSE Bug 983982 for CVE-2016-5338", "url": "https://bugzilla.suse.com/983982" }, { "category": "external", "summary": "SUSE Bug 983984 for CVE-2016-5338", "url": "https://bugzilla.suse.com/983984" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "low" } ], "title": "CVE-2016-5338" }, { "cve": "CVE-2016-5403", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5403" } ], "notes": [ { "category": "general", "text": "The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5403", "url": "https://www.suse.com/security/cve/CVE-2016-5403" }, { "category": "external", "summary": "SUSE Bug 990923 for CVE-2016-5403", "url": "https://bugzilla.suse.com/990923" }, { "category": "external", "summary": "SUSE Bug 991080 for CVE-2016-5403", "url": "https://bugzilla.suse.com/991080" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "low" } ], "title": "CVE-2016-5403" }, { "cve": "CVE-2016-6258", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6258" } ], "notes": [ { "category": "general", "text": "The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6258", "url": "https://www.suse.com/security/cve/CVE-2016-6258" }, { "category": "external", "summary": "SUSE Bug 1072198 for CVE-2016-6258", "url": "https://bugzilla.suse.com/1072198" }, { "category": "external", "summary": "SUSE Bug 1072223 for CVE-2016-6258", "url": "https://bugzilla.suse.com/1072223" }, { "category": "external", "summary": "SUSE Bug 988675 for CVE-2016-6258", "url": "https://bugzilla.suse.com/988675" }, { "category": "external", "summary": "SUSE Bug 988692 for CVE-2016-6258", "url": "https://bugzilla.suse.com/988692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "important" } ], "title": "CVE-2016-6258" }, { "cve": "CVE-2016-6259", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6259" } ], "notes": [ { "category": "general", "text": "Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6259", "url": "https://www.suse.com/security/cve/CVE-2016-6259" }, { "category": "external", "summary": "SUSE Bug 988676 for CVE-2016-6259", "url": "https://bugzilla.suse.com/988676" }, { "category": "external", "summary": "SUSE Bug 988694 for CVE-2016-6259", "url": "https://bugzilla.suse.com/988694" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "moderate" } ], "title": "CVE-2016-6259" }, { "cve": "CVE-2016-6351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6351" } ], "notes": [ { "category": "general", "text": "The esp_do_dma function in hw/scsi/esp.c in QEMU (aka Quick Emulator), when built with ESP/NCR53C9x controller emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the QEMU host via vectors involving DMA read into ESP command buffer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6351", "url": "https://www.suse.com/security/cve/CVE-2016-6351" }, { "category": "external", "summary": "SUSE Bug 990835 for CVE-2016-6351", "url": "https://bugzilla.suse.com/990835" }, { "category": "external", "summary": "SUSE Bug 990843 for CVE-2016-6351", "url": "https://bugzilla.suse.com/990843" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.3_08-17.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:xen-devel-4.5.3_08-17.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-17T12:22:27Z", "details": "low" } ], "title": "CVE-2016-6351" } ] }
suse-su-2016:2528-1
Vulnerability from csaf_suse
Published
2016-10-13 14:16
Modified
2016-10-13 14:16
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes several issues.
These security issues were fixed:
- CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792)
- CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785)
- CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries (bsc#988675)
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the host via vectors related to the information transfer buffer (bsc#983984)
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960)
- CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264)
- CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724)
- CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716)
- CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the 'Dark Portal' issue (bsc#978164)
- CVE-2016-4480: The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen did not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might have allowed local guest OS users to gain privileges via a crafted mapping of memory (bsc#978295)
- CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038)
- CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188)
- CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130)
- CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138)
Patchnames
slessp2-xen-12786
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes several issues.\n\nThese security issues were fixed:\n- CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792)\n- CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785)\n- CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries (bsc#988675)\n- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the host via vectors related to the information transfer buffer (bsc#983984)\n- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960)\n- CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264)\n- CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724)\n- CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716)\n- CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \u0027Dark Portal\u0027 issue (bsc#978164)\n- CVE-2016-4480: The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen did not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might have allowed local guest OS users to gain privileges via a crafted mapping of memory (bsc#978295)\n- CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038)\n- CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188)\n- CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130)\n- CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138)\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp2-xen-12786", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2528-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2528-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162528-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2528-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002332.html" }, { "category": "self", "summary": "SUSE Bug 973188", "url": "https://bugzilla.suse.com/973188" }, { "category": "self", "summary": "SUSE Bug 974038", "url": "https://bugzilla.suse.com/974038" }, { "category": "self", "summary": "SUSE Bug 975130", "url": "https://bugzilla.suse.com/975130" }, { "category": "self", "summary": "SUSE Bug 975138", "url": "https://bugzilla.suse.com/975138" }, { "category": "self", "summary": "SUSE Bug 978164", "url": "https://bugzilla.suse.com/978164" }, { "category": "self", "summary": "SUSE Bug 978295", "url": "https://bugzilla.suse.com/978295" }, { "category": "self", "summary": "SUSE Bug 980716", "url": "https://bugzilla.suse.com/980716" }, { "category": "self", "summary": "SUSE Bug 980724", "url": "https://bugzilla.suse.com/980724" }, { "category": "self", "summary": "SUSE Bug 981264", "url": "https://bugzilla.suse.com/981264" }, { "category": "self", "summary": "SUSE Bug 982960", "url": "https://bugzilla.suse.com/982960" }, { "category": "self", "summary": "SUSE Bug 983984", "url": "https://bugzilla.suse.com/983984" }, { "category": "self", "summary": "SUSE Bug 988675", "url": "https://bugzilla.suse.com/988675" }, { "category": "self", "summary": "SUSE Bug 995785", "url": "https://bugzilla.suse.com/995785" }, { "category": "self", "summary": "SUSE Bug 995792", "url": "https://bugzilla.suse.com/995792" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3615 page", "url": "https://www.suse.com/security/cve/CVE-2014-3615/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3672 page", "url": "https://www.suse.com/security/cve/CVE-2014-3672/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3158 page", "url": "https://www.suse.com/security/cve/CVE-2016-3158/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3159 page", "url": "https://www.suse.com/security/cve/CVE-2016-3159/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3710 page", "url": "https://www.suse.com/security/cve/CVE-2016-3710/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3960 page", "url": "https://www.suse.com/security/cve/CVE-2016-3960/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4001 page", "url": "https://www.suse.com/security/cve/CVE-2016-4001/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4002 page", "url": "https://www.suse.com/security/cve/CVE-2016-4002/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4439 page", "url": "https://www.suse.com/security/cve/CVE-2016-4439/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4441 page", "url": "https://www.suse.com/security/cve/CVE-2016-4441/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4480 page", "url": "https://www.suse.com/security/cve/CVE-2016-4480/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5238 page", "url": "https://www.suse.com/security/cve/CVE-2016-5238/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5338 page", "url": "https://www.suse.com/security/cve/CVE-2016-5338/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6258 page", "url": "https://www.suse.com/security/cve/CVE-2016-6258/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7092 page", "url": "https://www.suse.com/security/cve/CVE-2016-7092/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7094 page", "url": "https://www.suse.com/security/cve/CVE-2016-7094/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2016-10-13T14:16:36Z", "generator": { "date": "2016-10-13T14:16:36Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2528-1", "initial_release_date": "2016-10-13T14:16:36Z", "revision_history": [ { "date": "2016-10-13T14:16:36Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-devel-4.1.6_08-29.1.i586", "product": { "name": "xen-devel-4.1.6_08-29.1.i586", "product_id": "xen-devel-4.1.6_08-29.1.i586" } }, { "category": "product_version", "name": "xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "product": { "name": "xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "product_id": "xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586" } }, { "category": "product_version", "name": "xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "product": { "name": "xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "product_id": "xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586" } }, { "category": "product_version", "name": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "product": { "name": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "product_id": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.1.6_08-29.1.i586", "product": { "name": "xen-libs-4.1.6_08-29.1.i586", "product_id": "xen-libs-4.1.6_08-29.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.1.6_08-29.1.i586", "product": { "name": "xen-tools-domU-4.1.6_08-29.1.i586", "product_id": "xen-tools-domU-4.1.6_08-29.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.1.6_08-29.1.x86_64", "product": { "name": "xen-4.1.6_08-29.1.x86_64", "product_id": "xen-4.1.6_08-29.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.1.6_08-29.1.x86_64", "product": { "name": "xen-devel-4.1.6_08-29.1.x86_64", "product_id": "xen-devel-4.1.6_08-29.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.1.6_08-29.1.x86_64", "product": { "name": "xen-doc-html-4.1.6_08-29.1.x86_64", "product_id": "xen-doc-html-4.1.6_08-29.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-pdf-4.1.6_08-29.1.x86_64", "product": { "name": "xen-doc-pdf-4.1.6_08-29.1.x86_64", "product_id": "xen-doc-pdf-4.1.6_08-29.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "product": { "name": "xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "product_id": "xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "product": { "name": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "product_id": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.1.6_08-29.1.x86_64", "product": { "name": "xen-libs-4.1.6_08-29.1.x86_64", "product_id": "xen-libs-4.1.6_08-29.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.1.6_08-29.1.x86_64", "product": { "name": "xen-libs-32bit-4.1.6_08-29.1.x86_64", "product_id": "xen-libs-32bit-4.1.6_08-29.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.1.6_08-29.1.x86_64", "product": { "name": "xen-tools-4.1.6_08-29.1.x86_64", "product_id": "xen-tools-4.1.6_08-29.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.1.6_08-29.1.x86_64", "product": { "name": "xen-tools-domU-4.1.6_08-29.1.x86_64", "product_id": "xen-tools-domU-4.1.6_08-29.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.1.6_08-29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64" }, "product_reference": "xen-4.1.6_08-29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.1.6_08-29.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586" }, "product_reference": "xen-devel-4.1.6_08-29.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.1.6_08-29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64" }, "product_reference": "xen-devel-4.1.6_08-29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.1.6_08-29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64" }, "product_reference": "xen-doc-html-4.1.6_08-29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.1.6_08-29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64" }, "product_reference": "xen-doc-pdf-4.1.6_08-29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586" }, "product_reference": "xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64" }, "product_reference": "xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586" }, "product_reference": "xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586" }, "product_reference": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64" }, "product_reference": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.1.6_08-29.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586" }, "product_reference": "xen-libs-4.1.6_08-29.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.1.6_08-29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64" }, "product_reference": "xen-libs-4.1.6_08-29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.1.6_08-29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64" }, "product_reference": "xen-libs-32bit-4.1.6_08-29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.1.6_08-29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64" }, "product_reference": "xen-tools-4.1.6_08-29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.1.6_08-29.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586" }, "product_reference": "xen-tools-domU-4.1.6_08-29.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.1.6_08-29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" }, "product_reference": "xen-tools-domU-4.1.6_08-29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-3615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3615" } ], "notes": [ { "category": "general", "text": "The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3615", "url": "https://www.suse.com/security/cve/CVE-2014-3615" }, { "category": "external", "summary": "SUSE Bug 895528 for CVE-2014-3615", "url": "https://bugzilla.suse.com/895528" }, { "category": "external", "summary": "SUSE Bug 918998 for CVE-2014-3615", "url": "https://bugzilla.suse.com/918998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T14:16:36Z", "details": "moderate" } ], "title": "CVE-2014-3615" }, { "cve": "CVE-2014-3672", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3672" } ], "notes": [ { "category": "general", "text": "The qemu implementation in libvirt before 1.3.0 and Xen allows local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3672", "url": "https://www.suse.com/security/cve/CVE-2014-3672" }, { "category": "external", "summary": "SUSE Bug 981264 for CVE-2014-3672", "url": "https://bugzilla.suse.com/981264" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T14:16:36Z", "details": "low" } ], "title": "CVE-2014-3672" }, { "cve": "CVE-2016-3158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3158" } ], "notes": [ { "category": "general", "text": "The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3158", "url": "https://www.suse.com/security/cve/CVE-2016-3158" }, { "category": "external", "summary": "SUSE Bug 973188 for CVE-2016-3158", "url": "https://bugzilla.suse.com/973188" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T14:16:36Z", "details": "low" } ], "title": "CVE-2016-3158" }, { "cve": "CVE-2016-3159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3159" } ], "notes": [ { "category": "general", "text": "The fpu_fxrstor function in arch/x86/i387.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3159", "url": "https://www.suse.com/security/cve/CVE-2016-3159" }, { "category": "external", "summary": "SUSE Bug 973188 for CVE-2016-3159", "url": "https://bugzilla.suse.com/973188" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T14:16:36Z", "details": "low" } ], "title": "CVE-2016-3159" }, { "cve": "CVE-2016-3710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3710" } ], "notes": [ { "category": "general", "text": "The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \"Dark Portal\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3710", "url": "https://www.suse.com/security/cve/CVE-2016-3710" }, { "category": "external", "summary": "SUSE Bug 978158 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978158" }, { "category": "external", "summary": "SUSE Bug 978164 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978164" }, { "category": "external", "summary": "SUSE Bug 978167 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978167" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T14:16:36Z", "details": "moderate" } ], "title": "CVE-2016-3710" }, { "cve": "CVE-2016-3960", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3960" } ], "notes": [ { "category": "general", "text": "Integer overflow in the x86 shadow pagetable code in Xen allows local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3960", "url": "https://www.suse.com/security/cve/CVE-2016-3960" }, { "category": "external", "summary": "SUSE Bug 1072223 for CVE-2016-3960", "url": "https://bugzilla.suse.com/1072223" }, { "category": "external", "summary": "SUSE Bug 974038 for CVE-2016-3960", "url": "https://bugzilla.suse.com/974038" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T14:16:36Z", "details": "important" } ], "title": "CVE-2016-3960" }, { "cve": "CVE-2016-4001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4001" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4001", "url": "https://www.suse.com/security/cve/CVE-2016-4001" }, { "category": "external", "summary": "SUSE Bug 975128 for CVE-2016-4001", "url": "https://bugzilla.suse.com/975128" }, { "category": "external", "summary": "SUSE Bug 975130 for CVE-2016-4001", "url": "https://bugzilla.suse.com/975130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T14:16:36Z", "details": "moderate" } ], "title": "CVE-2016-4001" }, { "cve": "CVE-2016-4002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4002" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4002", "url": "https://www.suse.com/security/cve/CVE-2016-4002" }, { "category": "external", "summary": "SUSE Bug 975136 for CVE-2016-4002", "url": "https://bugzilla.suse.com/975136" }, { "category": "external", "summary": "SUSE Bug 975138 for CVE-2016-4002", "url": "https://bugzilla.suse.com/975138" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T14:16:36Z", "details": "moderate" } ], "title": "CVE-2016-4002" }, { "cve": "CVE-2016-4439", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4439" } ], "notes": [ { "category": "general", "text": "The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4439", "url": "https://www.suse.com/security/cve/CVE-2016-4439" }, { "category": "external", "summary": "SUSE Bug 980711 for CVE-2016-4439", "url": "https://bugzilla.suse.com/980711" }, { "category": "external", "summary": "SUSE Bug 980716 for CVE-2016-4439", "url": "https://bugzilla.suse.com/980716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T14:16:36Z", "details": "low" } ], "title": "CVE-2016-4439" }, { "cve": "CVE-2016-4441", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4441" } ], "notes": [ { "category": "general", "text": "The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4441", "url": "https://www.suse.com/security/cve/CVE-2016-4441" }, { "category": "external", "summary": "SUSE Bug 980723 for CVE-2016-4441", "url": "https://bugzilla.suse.com/980723" }, { "category": "external", "summary": "SUSE Bug 980724 for CVE-2016-4441", "url": "https://bugzilla.suse.com/980724" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T14:16:36Z", "details": "low" } ], "title": "CVE-2016-4441" }, { "cve": "CVE-2016-4480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4480" } ], "notes": [ { "category": "general", "text": "The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4480", "url": "https://www.suse.com/security/cve/CVE-2016-4480" }, { "category": "external", "summary": "SUSE Bug 1072198 for CVE-2016-4480", "url": "https://bugzilla.suse.com/1072198" }, { "category": "external", "summary": "SUSE Bug 1072223 for CVE-2016-4480", "url": "https://bugzilla.suse.com/1072223" }, { "category": "external", "summary": "SUSE Bug 978288 for CVE-2016-4480", "url": "https://bugzilla.suse.com/978288" }, { "category": "external", "summary": "SUSE Bug 978295 for CVE-2016-4480", "url": "https://bugzilla.suse.com/978295" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T14:16:36Z", "details": "important" } ], "title": "CVE-2016-4480" }, { "cve": "CVE-2016-5238", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5238" } ], "notes": [ { "category": "general", "text": "The get_cmd function in hw/scsi/esp.c in QEMU might allow local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5238", "url": "https://www.suse.com/security/cve/CVE-2016-5238" }, { "category": "external", "summary": "SUSE Bug 982959 for CVE-2016-5238", "url": "https://bugzilla.suse.com/982959" }, { "category": "external", "summary": "SUSE Bug 982960 for CVE-2016-5238", "url": "https://bugzilla.suse.com/982960" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T14:16:36Z", "details": "moderate" } ], "title": "CVE-2016-5238" }, { "cve": "CVE-2016-5338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5338" } ], "notes": [ { "category": "general", "text": "The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5338", "url": "https://www.suse.com/security/cve/CVE-2016-5338" }, { "category": "external", "summary": "SUSE Bug 983982 for CVE-2016-5338", "url": "https://bugzilla.suse.com/983982" }, { "category": "external", "summary": "SUSE Bug 983984 for CVE-2016-5338", "url": "https://bugzilla.suse.com/983984" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T14:16:36Z", "details": "low" } ], "title": "CVE-2016-5338" }, { "cve": "CVE-2016-6258", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6258" } ], "notes": [ { "category": "general", "text": "The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6258", "url": "https://www.suse.com/security/cve/CVE-2016-6258" }, { "category": "external", "summary": "SUSE Bug 1072198 for CVE-2016-6258", "url": "https://bugzilla.suse.com/1072198" }, { "category": "external", "summary": "SUSE Bug 1072223 for CVE-2016-6258", "url": "https://bugzilla.suse.com/1072223" }, { "category": "external", "summary": "SUSE Bug 988675 for CVE-2016-6258", "url": "https://bugzilla.suse.com/988675" }, { "category": "external", "summary": "SUSE Bug 988692 for CVE-2016-6258", "url": "https://bugzilla.suse.com/988692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T14:16:36Z", "details": "important" } ], "title": "CVE-2016-6258" }, { "cve": "CVE-2016-7092", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7092" } ], "notes": [ { "category": "general", "text": "The get_page_from_l3e function in arch/x86/mm.c in Xen allows local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7092", "url": "https://www.suse.com/security/cve/CVE-2016-7092" }, { "category": "external", "summary": "SUSE Bug 995785 for CVE-2016-7092", "url": "https://bugzilla.suse.com/995785" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T14:16:36Z", "details": "important" } ], "title": "CVE-2016-7092" }, { "cve": "CVE-2016-7094", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7094" } ], "notes": [ { "category": "general", "text": "Buffer overflow in Xen 4.7.x and earlier allows local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7094", "url": "https://www.suse.com/security/cve/CVE-2016-7094" }, { "category": "external", "summary": "SUSE Bug 995792 for CVE-2016-7094", "url": "https://bugzilla.suse.com/995792" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-29.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T14:16:36Z", "details": "moderate" } ], "title": "CVE-2016-7094" } ] }
suse-su-2016:1703-1
Vulnerability from csaf_suse
Published
2016-06-29 05:47
Modified
2016-06-29 05:47
Summary
Security update for qemu
Notes
Title of the patch
Security update for qemu
Description of the patch
qemu was updated to fix 29 security issues.
These security issues were fixed:
- CVE-2016-4439: Avoid OOB access in 53C9X emulation (bsc#980711)
- CVE-2016-4441: Avoid OOB access in 53C9X emulation (bsc#980723)
- CVE-2016-4952: Avoid OOB access in Vmware PV SCSI emulation (bsc#981266)
- CVE-2015-8817: Avoid OOB access in PCI dma I/O (bsc#969121)
- CVE-2015-8818: Avoid OOB access in PCI dma I/O (bsc#969122)
- CVE-2016-3710: Fixed VGA emulation based OOB access with potential for guest escape (bsc#978158)
- CVE-2016-3712: Fixed VGa emulation based DOS and OOB read access exploit (bsc#978160)
- CVE-2016-4037: Fixed USB ehci based DOS (bsc#976109)
- CVE-2016-2538: Fixed potential OOB access in USB net device emulation (bsc#967969)
- CVE-2016-2841: Fixed OOB access / hang in ne2000 emulation (bsc#969350)
- CVE-2016-2858: Avoid potential DOS when using QEMU pseudo random number generator (bsc#970036)
- CVE-2016-2857: Fixed OOB access when processing IP checksums (bsc#970037)
- CVE-2016-4001: Fixed OOB access in Stellaris enet emulated nic (bsc#975128)
- CVE-2016-4002: Fixed OOB access in MIPSnet emulated controller (bsc#975136)
- CVE-2016-4020: Fixed possible host data leakage to guest from TPR access (bsc#975700)
- CVE-2016-2197: Prevent AHCI NULL pointer dereference when using FIS CLB engine (bsc#964411)
- CVE-2015-5745: Buffer overflow in virtio-serial (bsc#940929).
- CVE-2015-7549: PCI null pointer dereferences (bsc#958917).
- CVE-2015-8504: VNC floating point exception (bsc#958491).
- CVE-2015-8558: Infinite loop in ehci_advance_state resulting in DoS (bsc#959005).
- CVE-2015-8567: A guest repeatedly activating a vmxnet3 device can leak host memory (bsc#959386).
- CVE-2015-8568: A guest repeatedly activating a vmxnet3 device can leak host memory (bsc#959386).
- CVE-2015-8613: Wrong sized memset in megasas command handler (bsc#961358).
- CVE-2015-8619: Potential DoS for long HMP sendkey command argument (bsc#960334).
- CVE-2015-8743: OOB memory access in ne2000 ioport r/w functions (bsc#960725).
- CVE-2015-8744: Incorrect l2 header validation could have lead to a crash via assert(2) call (bsc#960835).
- CVE-2015-8745: Reading IMR registers could have lead to a crash via assert(2) call (bsc#960708).
- CVE-2016-1568: AHCI use-after-free in aio port commands (bsc#961332).
- CVE-2016-1714: Potential OOB memory access in processing firmware configuration (bsc#961691).
- CVE-2016-1922: NULL pointer dereference when processing hmp i/o command (bsc#962320).
- CVE-2016-1981: Potential DoS (infinite loop) in e1000 device emulation by malicious privileged user within guest (bsc#963782).
- CVE-2016-2198: Malicious privileged guest user were able to cause DoS by writing to read-only EHCI capabilities registers (bsc#964413).
This non-security issue was fixed
- bsc#886378: qemu truncates vhd images in virt-rescue
Patchnames
SUSE-SLE-DESKTOP-12-SP1-2016-1007,SUSE-SLE-SERVER-12-SP1-2016-1007
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for qemu", "title": "Title of the patch" }, { "category": "description", "text": "qemu was updated to fix 29 security issues.\n\nThese security issues were fixed:\n- CVE-2016-4439: Avoid OOB access in 53C9X emulation (bsc#980711)\n- CVE-2016-4441: Avoid OOB access in 53C9X emulation (bsc#980723)\n- CVE-2016-4952: Avoid OOB access in Vmware PV SCSI emulation (bsc#981266)\n- CVE-2015-8817: Avoid OOB access in PCI dma I/O (bsc#969121)\n- CVE-2015-8818: Avoid OOB access in PCI dma I/O (bsc#969122)\n- CVE-2016-3710: Fixed VGA emulation based OOB access with potential for guest escape (bsc#978158)\n- CVE-2016-3712: Fixed VGa emulation based DOS and OOB read access exploit (bsc#978160)\n- CVE-2016-4037: Fixed USB ehci based DOS (bsc#976109)\n- CVE-2016-2538: Fixed potential OOB access in USB net device emulation (bsc#967969)\n- CVE-2016-2841: Fixed OOB access / hang in ne2000 emulation (bsc#969350)\n- CVE-2016-2858: Avoid potential DOS when using QEMU pseudo random number generator (bsc#970036)\n- CVE-2016-2857: Fixed OOB access when processing IP checksums (bsc#970037)\n- CVE-2016-4001: Fixed OOB access in Stellaris enet emulated nic (bsc#975128)\n- CVE-2016-4002: Fixed OOB access in MIPSnet emulated controller (bsc#975136)\n- CVE-2016-4020: Fixed possible host data leakage to guest from TPR access (bsc#975700)\n- CVE-2016-2197: Prevent AHCI NULL pointer dereference when using FIS CLB engine (bsc#964411)\n- CVE-2015-5745: Buffer overflow in virtio-serial (bsc#940929).\n- CVE-2015-7549: PCI null pointer dereferences (bsc#958917).\n- CVE-2015-8504: VNC floating point exception (bsc#958491).\n- CVE-2015-8558: Infinite loop in ehci_advance_state resulting in DoS (bsc#959005).\n- CVE-2015-8567: A guest repeatedly activating a vmxnet3 device can leak host memory (bsc#959386).\n- CVE-2015-8568: A guest repeatedly activating a vmxnet3 device can leak host memory (bsc#959386).\n- CVE-2015-8613: Wrong sized memset in megasas command handler (bsc#961358).\n- CVE-2015-8619: Potential DoS for long HMP sendkey command argument (bsc#960334).\n- CVE-2015-8743: OOB memory access in ne2000 ioport r/w functions (bsc#960725).\n- CVE-2015-8744: Incorrect l2 header validation could have lead to a crash via assert(2) call (bsc#960835).\n- CVE-2015-8745: Reading IMR registers could have lead to a crash via assert(2) call (bsc#960708).\n- CVE-2016-1568: AHCI use-after-free in aio port commands (bsc#961332).\n- CVE-2016-1714: Potential OOB memory access in processing firmware configuration (bsc#961691).\n- CVE-2016-1922: NULL pointer dereference when processing hmp i/o command (bsc#962320).\n- CVE-2016-1981: Potential DoS (infinite loop) in e1000 device emulation by malicious privileged user within guest (bsc#963782).\n- CVE-2016-2198: Malicious privileged guest user were able to cause DoS by writing to read-only EHCI capabilities registers (bsc#964413).\n\nThis non-security issue was fixed\n- bsc#886378: qemu truncates vhd images in virt-rescue\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP1-2016-1007,SUSE-SLE-SERVER-12-SP1-2016-1007", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1703-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1703-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161703-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1703-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" }, { "category": "self", "summary": "SUSE Bug 886378", "url": "https://bugzilla.suse.com/886378" }, { "category": "self", "summary": "SUSE Bug 940929", "url": "https://bugzilla.suse.com/940929" }, { "category": "self", "summary": "SUSE Bug 958491", "url": "https://bugzilla.suse.com/958491" }, { "category": "self", "summary": "SUSE Bug 958917", "url": "https://bugzilla.suse.com/958917" }, { "category": "self", "summary": "SUSE Bug 959005", "url": "https://bugzilla.suse.com/959005" }, { "category": "self", "summary": "SUSE Bug 959386", "url": "https://bugzilla.suse.com/959386" }, { "category": "self", "summary": "SUSE Bug 960334", "url": "https://bugzilla.suse.com/960334" }, { "category": "self", "summary": "SUSE Bug 960708", "url": "https://bugzilla.suse.com/960708" }, { "category": "self", "summary": "SUSE Bug 960725", "url": "https://bugzilla.suse.com/960725" }, { "category": "self", "summary": "SUSE Bug 960835", "url": "https://bugzilla.suse.com/960835" }, { "category": "self", "summary": "SUSE Bug 961332", "url": "https://bugzilla.suse.com/961332" }, { "category": "self", "summary": "SUSE Bug 961333", "url": "https://bugzilla.suse.com/961333" }, { "category": "self", "summary": "SUSE Bug 961358", "url": "https://bugzilla.suse.com/961358" }, { "category": "self", "summary": "SUSE Bug 961556", "url": "https://bugzilla.suse.com/961556" }, { "category": "self", "summary": "SUSE Bug 961691", "url": "https://bugzilla.suse.com/961691" }, { "category": "self", "summary": "SUSE Bug 962320", "url": "https://bugzilla.suse.com/962320" }, { "category": "self", "summary": "SUSE Bug 963782", "url": "https://bugzilla.suse.com/963782" }, { "category": "self", "summary": "SUSE Bug 964411", "url": "https://bugzilla.suse.com/964411" }, { "category": "self", "summary": "SUSE Bug 964413", "url": "https://bugzilla.suse.com/964413" }, { "category": "self", "summary": "SUSE Bug 967969", "url": "https://bugzilla.suse.com/967969" }, { "category": "self", "summary": "SUSE Bug 969121", "url": "https://bugzilla.suse.com/969121" }, { "category": "self", "summary": "SUSE Bug 969122", "url": "https://bugzilla.suse.com/969122" }, { "category": "self", "summary": "SUSE Bug 969350", "url": "https://bugzilla.suse.com/969350" }, { "category": "self", "summary": "SUSE Bug 970036", "url": "https://bugzilla.suse.com/970036" }, { "category": "self", "summary": "SUSE Bug 970037", "url": "https://bugzilla.suse.com/970037" }, { "category": "self", "summary": "SUSE Bug 975128", "url": "https://bugzilla.suse.com/975128" }, { "category": "self", "summary": "SUSE Bug 975136", "url": "https://bugzilla.suse.com/975136" }, { "category": "self", "summary": "SUSE Bug 975700", "url": "https://bugzilla.suse.com/975700" }, { "category": "self", "summary": "SUSE Bug 976109", "url": "https://bugzilla.suse.com/976109" }, { "category": "self", "summary": "SUSE Bug 978158", "url": "https://bugzilla.suse.com/978158" }, { "category": "self", "summary": "SUSE Bug 978160", "url": "https://bugzilla.suse.com/978160" }, { "category": "self", "summary": "SUSE Bug 980711", "url": "https://bugzilla.suse.com/980711" }, { "category": "self", "summary": "SUSE Bug 980723", "url": "https://bugzilla.suse.com/980723" }, { "category": "self", "summary": "SUSE Bug 981266", "url": "https://bugzilla.suse.com/981266" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5745 page", "url": "https://www.suse.com/security/cve/CVE-2015-5745/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7549 page", "url": "https://www.suse.com/security/cve/CVE-2015-7549/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8504 page", "url": "https://www.suse.com/security/cve/CVE-2015-8504/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8558 page", "url": "https://www.suse.com/security/cve/CVE-2015-8558/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8567 page", "url": "https://www.suse.com/security/cve/CVE-2015-8567/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8568 page", "url": "https://www.suse.com/security/cve/CVE-2015-8568/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8613 page", "url": "https://www.suse.com/security/cve/CVE-2015-8613/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8619 page", "url": "https://www.suse.com/security/cve/CVE-2015-8619/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8743 page", "url": "https://www.suse.com/security/cve/CVE-2015-8743/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8744 page", "url": "https://www.suse.com/security/cve/CVE-2015-8744/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8745 page", "url": "https://www.suse.com/security/cve/CVE-2015-8745/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8817 page", "url": "https://www.suse.com/security/cve/CVE-2015-8817/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8818 page", "url": "https://www.suse.com/security/cve/CVE-2015-8818/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1568 page", "url": "https://www.suse.com/security/cve/CVE-2016-1568/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1714 page", "url": "https://www.suse.com/security/cve/CVE-2016-1714/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1922 page", "url": "https://www.suse.com/security/cve/CVE-2016-1922/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1981 page", "url": "https://www.suse.com/security/cve/CVE-2016-1981/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2197 page", "url": "https://www.suse.com/security/cve/CVE-2016-2197/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2198 page", "url": "https://www.suse.com/security/cve/CVE-2016-2198/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2538 page", "url": "https://www.suse.com/security/cve/CVE-2016-2538/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2841 page", "url": "https://www.suse.com/security/cve/CVE-2016-2841/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2857 page", "url": "https://www.suse.com/security/cve/CVE-2016-2857/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2858 page", "url": "https://www.suse.com/security/cve/CVE-2016-2858/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3710 page", "url": "https://www.suse.com/security/cve/CVE-2016-3710/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3712 page", "url": "https://www.suse.com/security/cve/CVE-2016-3712/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4001 page", "url": "https://www.suse.com/security/cve/CVE-2016-4001/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4002 page", "url": "https://www.suse.com/security/cve/CVE-2016-4002/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4020 page", "url": "https://www.suse.com/security/cve/CVE-2016-4020/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4037 page", "url": "https://www.suse.com/security/cve/CVE-2016-4037/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4439 page", "url": "https://www.suse.com/security/cve/CVE-2016-4439/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4441 page", "url": "https://www.suse.com/security/cve/CVE-2016-4441/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4952 page", "url": "https://www.suse.com/security/cve/CVE-2016-4952/" } ], "title": "Security update for qemu", "tracking": { "current_release_date": "2016-06-29T05:47:55Z", "generator": { "date": "2016-06-29T05:47:55Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1703-1", "initial_release_date": "2016-06-29T05:47:55Z", "revision_history": [ { "date": "2016-06-29T05:47:55Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "qemu-ipxe-1.0.0-14.1.noarch", "product": { "name": "qemu-ipxe-1.0.0-14.1.noarch", "product_id": "qemu-ipxe-1.0.0-14.1.noarch" } }, { "category": "product_version", "name": "qemu-seabios-1.8.1-14.1.noarch", "product": { "name": "qemu-seabios-1.8.1-14.1.noarch", "product_id": "qemu-seabios-1.8.1-14.1.noarch" } }, { "category": "product_version", "name": "qemu-sgabios-8-14.1.noarch", "product": { "name": "qemu-sgabios-8-14.1.noarch", "product_id": "qemu-sgabios-8-14.1.noarch" } }, { "category": "product_version", "name": "qemu-vgabios-1.8.1-14.1.noarch", "product": { "name": "qemu-vgabios-1.8.1-14.1.noarch", "product_id": "qemu-vgabios-1.8.1-14.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "qemu-2.3.1-14.1.ppc64le", "product": { "name": "qemu-2.3.1-14.1.ppc64le", "product_id": "qemu-2.3.1-14.1.ppc64le" } }, { "category": "product_version", "name": "qemu-block-curl-2.3.1-14.1.ppc64le", "product": { "name": "qemu-block-curl-2.3.1-14.1.ppc64le", "product_id": "qemu-block-curl-2.3.1-14.1.ppc64le" } }, { "category": "product_version", "name": "qemu-guest-agent-2.3.1-14.1.ppc64le", "product": { "name": "qemu-guest-agent-2.3.1-14.1.ppc64le", "product_id": "qemu-guest-agent-2.3.1-14.1.ppc64le" } }, { "category": "product_version", "name": "qemu-lang-2.3.1-14.1.ppc64le", "product": { "name": "qemu-lang-2.3.1-14.1.ppc64le", "product_id": "qemu-lang-2.3.1-14.1.ppc64le" } }, { "category": "product_version", "name": "qemu-ppc-2.3.1-14.1.ppc64le", "product": { "name": "qemu-ppc-2.3.1-14.1.ppc64le", "product_id": "qemu-ppc-2.3.1-14.1.ppc64le" } }, { "category": "product_version", "name": "qemu-tools-2.3.1-14.1.ppc64le", "product": { "name": "qemu-tools-2.3.1-14.1.ppc64le", "product_id": "qemu-tools-2.3.1-14.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "qemu-2.3.1-14.1.s390x", "product": { "name": "qemu-2.3.1-14.1.s390x", "product_id": "qemu-2.3.1-14.1.s390x" } }, { "category": "product_version", "name": "qemu-block-curl-2.3.1-14.1.s390x", "product": { "name": "qemu-block-curl-2.3.1-14.1.s390x", "product_id": "qemu-block-curl-2.3.1-14.1.s390x" } }, { "category": "product_version", "name": "qemu-guest-agent-2.3.1-14.1.s390x", "product": { "name": "qemu-guest-agent-2.3.1-14.1.s390x", "product_id": "qemu-guest-agent-2.3.1-14.1.s390x" } }, { "category": "product_version", "name": "qemu-kvm-2.3.1-14.1.s390x", "product": { "name": "qemu-kvm-2.3.1-14.1.s390x", "product_id": "qemu-kvm-2.3.1-14.1.s390x" } }, { "category": "product_version", "name": "qemu-lang-2.3.1-14.1.s390x", "product": { "name": "qemu-lang-2.3.1-14.1.s390x", "product_id": "qemu-lang-2.3.1-14.1.s390x" } }, { "category": "product_version", "name": "qemu-s390-2.3.1-14.1.s390x", "product": { "name": "qemu-s390-2.3.1-14.1.s390x", "product_id": "qemu-s390-2.3.1-14.1.s390x" } }, { "category": "product_version", "name": "qemu-tools-2.3.1-14.1.s390x", "product": { "name": "qemu-tools-2.3.1-14.1.s390x", "product_id": "qemu-tools-2.3.1-14.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "qemu-2.3.1-14.1.x86_64", "product": { "name": "qemu-2.3.1-14.1.x86_64", "product_id": "qemu-2.3.1-14.1.x86_64" } }, { "category": "product_version", "name": "qemu-block-curl-2.3.1-14.1.x86_64", "product": { "name": "qemu-block-curl-2.3.1-14.1.x86_64", "product_id": "qemu-block-curl-2.3.1-14.1.x86_64" } }, { "category": "product_version", "name": "qemu-kvm-2.3.1-14.1.x86_64", "product": { "name": "qemu-kvm-2.3.1-14.1.x86_64", "product_id": "qemu-kvm-2.3.1-14.1.x86_64" } }, { "category": "product_version", "name": "qemu-tools-2.3.1-14.1.x86_64", "product": { "name": "qemu-tools-2.3.1-14.1.x86_64", "product_id": "qemu-tools-2.3.1-14.1.x86_64" } }, { "category": "product_version", "name": "qemu-x86-2.3.1-14.1.x86_64", "product": { "name": "qemu-x86-2.3.1-14.1.x86_64", "product_id": "qemu-x86-2.3.1-14.1.x86_64" } }, { "category": "product_version", "name": "qemu-block-rbd-2.3.1-14.1.x86_64", "product": { "name": "qemu-block-rbd-2.3.1-14.1.x86_64", "product_id": "qemu-block-rbd-2.3.1-14.1.x86_64" } }, { "category": "product_version", "name": "qemu-guest-agent-2.3.1-14.1.x86_64", "product": { "name": "qemu-guest-agent-2.3.1-14.1.x86_64", "product_id": "qemu-guest-agent-2.3.1-14.1.x86_64" } }, { "category": "product_version", "name": "qemu-lang-2.3.1-14.1.x86_64", "product": { "name": "qemu-lang-2.3.1-14.1.x86_64", "product_id": "qemu-lang-2.3.1-14.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-2.3.1-14.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64" }, "product_reference": "qemu-2.3.1-14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.3.1-14.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64" }, "product_reference": "qemu-block-curl-2.3.1-14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-ipxe-1.0.0-14.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch" }, "product_reference": "qemu-ipxe-1.0.0-14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2.3.1-14.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64" }, "product_reference": "qemu-kvm-2.3.1-14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-seabios-1.8.1-14.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch" }, "product_reference": "qemu-seabios-1.8.1-14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-sgabios-8-14.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch" }, "product_reference": "qemu-sgabios-8-14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.3.1-14.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64" }, "product_reference": "qemu-tools-2.3.1-14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-vgabios-1.8.1-14.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch" }, "product_reference": "qemu-vgabios-1.8.1-14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-x86-2.3.1-14.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64" }, "product_reference": "qemu-x86-2.3.1-14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-2.3.1-14.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le" }, "product_reference": "qemu-2.3.1-14.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-2.3.1-14.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x" }, "product_reference": "qemu-2.3.1-14.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-2.3.1-14.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64" }, "product_reference": "qemu-2.3.1-14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.3.1-14.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le" }, "product_reference": "qemu-block-curl-2.3.1-14.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.3.1-14.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x" }, "product_reference": "qemu-block-curl-2.3.1-14.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.3.1-14.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64" }, "product_reference": "qemu-block-curl-2.3.1-14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-rbd-2.3.1-14.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64" }, "product_reference": "qemu-block-rbd-2.3.1-14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2.3.1-14.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le" }, "product_reference": "qemu-guest-agent-2.3.1-14.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2.3.1-14.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x" }, "product_reference": "qemu-guest-agent-2.3.1-14.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2.3.1-14.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64" }, "product_reference": "qemu-guest-agent-2.3.1-14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-ipxe-1.0.0-14.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch" }, "product_reference": "qemu-ipxe-1.0.0-14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2.3.1-14.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x" }, "product_reference": "qemu-kvm-2.3.1-14.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2.3.1-14.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64" }, "product_reference": "qemu-kvm-2.3.1-14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-lang-2.3.1-14.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le" }, "product_reference": "qemu-lang-2.3.1-14.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-lang-2.3.1-14.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x" }, "product_reference": "qemu-lang-2.3.1-14.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-lang-2.3.1-14.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64" }, "product_reference": "qemu-lang-2.3.1-14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-ppc-2.3.1-14.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le" }, "product_reference": "qemu-ppc-2.3.1-14.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-s390-2.3.1-14.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x" }, "product_reference": "qemu-s390-2.3.1-14.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-seabios-1.8.1-14.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch" }, "product_reference": "qemu-seabios-1.8.1-14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-sgabios-8-14.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch" }, "product_reference": "qemu-sgabios-8-14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.3.1-14.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le" }, "product_reference": "qemu-tools-2.3.1-14.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.3.1-14.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x" }, "product_reference": "qemu-tools-2.3.1-14.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.3.1-14.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64" }, "product_reference": "qemu-tools-2.3.1-14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-vgabios-1.8.1-14.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch" }, "product_reference": "qemu-vgabios-1.8.1-14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-x86-2.3.1-14.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64" }, "product_reference": "qemu-x86-2.3.1-14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-2.3.1-14.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le" }, "product_reference": "qemu-2.3.1-14.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-2.3.1-14.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x" }, "product_reference": "qemu-2.3.1-14.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-2.3.1-14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64" }, "product_reference": "qemu-2.3.1-14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.3.1-14.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le" }, "product_reference": "qemu-block-curl-2.3.1-14.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.3.1-14.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x" }, "product_reference": "qemu-block-curl-2.3.1-14.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.3.1-14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64" }, "product_reference": "qemu-block-curl-2.3.1-14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-rbd-2.3.1-14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64" }, "product_reference": "qemu-block-rbd-2.3.1-14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2.3.1-14.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le" }, "product_reference": "qemu-guest-agent-2.3.1-14.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2.3.1-14.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x" }, "product_reference": "qemu-guest-agent-2.3.1-14.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2.3.1-14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64" }, "product_reference": "qemu-guest-agent-2.3.1-14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-ipxe-1.0.0-14.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch" }, "product_reference": "qemu-ipxe-1.0.0-14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2.3.1-14.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x" }, "product_reference": "qemu-kvm-2.3.1-14.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2.3.1-14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64" }, "product_reference": "qemu-kvm-2.3.1-14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-lang-2.3.1-14.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le" }, "product_reference": "qemu-lang-2.3.1-14.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-lang-2.3.1-14.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x" }, "product_reference": "qemu-lang-2.3.1-14.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-lang-2.3.1-14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64" }, "product_reference": "qemu-lang-2.3.1-14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-ppc-2.3.1-14.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le" }, "product_reference": "qemu-ppc-2.3.1-14.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-s390-2.3.1-14.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x" }, "product_reference": "qemu-s390-2.3.1-14.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-seabios-1.8.1-14.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch" }, "product_reference": "qemu-seabios-1.8.1-14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-sgabios-8-14.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch" }, "product_reference": "qemu-sgabios-8-14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.3.1-14.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le" }, "product_reference": "qemu-tools-2.3.1-14.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.3.1-14.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x" }, "product_reference": "qemu-tools-2.3.1-14.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.3.1-14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64" }, "product_reference": "qemu-tools-2.3.1-14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-vgabios-1.8.1-14.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch" }, "product_reference": "qemu-vgabios-1.8.1-14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-x86-2.3.1-14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" }, "product_reference": "qemu-x86-2.3.1-14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-5745", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5745" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU before 2.4.0 allows guest users to cause a denial of service (QEMU process crash) via a crafted virtio control message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5745", "url": "https://www.suse.com/security/cve/CVE-2015-5745" }, { "category": "external", "summary": "SUSE Bug 940929 for CVE-2015-5745", "url": "https://bugzilla.suse.com/940929" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2015-5745", "url": "https://bugzilla.suse.com/950367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "low" } ], "title": "CVE-2015-5745" }, { "cve": "CVE-2015-7549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7549" } ], "notes": [ { "category": "general", "text": "The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7549", "url": "https://www.suse.com/security/cve/CVE-2015-7549" }, { "category": "external", "summary": "SUSE Bug 958917 for CVE-2015-7549", "url": "https://bugzilla.suse.com/958917" }, { "category": "external", "summary": "SUSE Bug 958918 for CVE-2015-7549", "url": "https://bugzilla.suse.com/958918" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "low" } ], "title": "CVE-2015-7549" }, { "cve": "CVE-2015-8504", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8504" } ], "notes": [ { "category": "general", "text": "Qemu, when built with VNC display driver support, allows remote attackers to cause a denial of service (arithmetic exception and application crash) via crafted SetPixelFormat messages from a client.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8504", "url": "https://www.suse.com/security/cve/CVE-2015-8504" }, { "category": "external", "summary": "SUSE Bug 958491 for CVE-2015-8504", "url": "https://bugzilla.suse.com/958491" }, { "category": "external", "summary": "SUSE Bug 958493 for CVE-2015-8504", "url": "https://bugzilla.suse.com/958493" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "moderate" } ], "title": "CVE-2015-8504" }, { "cve": "CVE-2015-8558", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8558" } ], "notes": [ { "category": "general", "text": "The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8558", "url": "https://www.suse.com/security/cve/CVE-2015-8558" }, { "category": "external", "summary": "SUSE Bug 959005 for CVE-2015-8558", "url": "https://bugzilla.suse.com/959005" }, { "category": "external", "summary": "SUSE Bug 959006 for CVE-2015-8558", "url": "https://bugzilla.suse.com/959006" }, { "category": "external", "summary": "SUSE Bug 976109 for CVE-2015-8558", "url": "https://bugzilla.suse.com/976109" }, { "category": "external", "summary": "SUSE Bug 976111 for CVE-2015-8558", "url": "https://bugzilla.suse.com/976111" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "moderate" } ], "title": "CVE-2015-8558" }, { "cve": "CVE-2015-8567", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8567" } ], "notes": [ { "category": "general", "text": "Memory leak in net/vmxnet3.c in QEMU allows remote attackers to cause a denial of service (memory consumption).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8567", "url": "https://www.suse.com/security/cve/CVE-2015-8567" }, { "category": "external", "summary": "SUSE Bug 959386 for CVE-2015-8567", "url": "https://bugzilla.suse.com/959386" }, { "category": "external", "summary": "SUSE Bug 959387 for CVE-2015-8567", "url": "https://bugzilla.suse.com/959387" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "low" } ], "title": "CVE-2015-8567" }, { "cve": "CVE-2015-8568", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8568" } ], "notes": [ { "category": "general", "text": "Memory leak in QEMU, when built with a VMWARE VMXNET3 paravirtual NIC emulator support, allows local guest users to cause a denial of service (host memory consumption) by trying to activate the vmxnet3 device repeatedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8568", "url": "https://www.suse.com/security/cve/CVE-2015-8568" }, { "category": "external", "summary": "SUSE Bug 959386 for CVE-2015-8568", "url": "https://bugzilla.suse.com/959386" }, { "category": "external", "summary": "SUSE Bug 959387 for CVE-2015-8568", "url": "https://bugzilla.suse.com/959387" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "low" } ], "title": "CVE-2015-8568" }, { "cve": "CVE-2015-8613", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8613" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest users to cause a denial of service (QEMU instance crash) via a crafted SCSI controller CTRL_GET_INFO command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8613", "url": "https://www.suse.com/security/cve/CVE-2015-8613" }, { "category": "external", "summary": "SUSE Bug 961358 for CVE-2015-8613", "url": "https://bugzilla.suse.com/961358" }, { "category": "external", "summary": "SUSE Bug 961556 for CVE-2015-8613", "url": "https://bugzilla.suse.com/961556" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "moderate" } ], "title": "CVE-2015-8613" }, { "cve": "CVE-2015-8619", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8619" } ], "notes": [ { "category": "general", "text": "The Human Monitor Interface support in QEMU allows remote attackers to cause a denial of service (out-of-bounds write and application crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8619", "url": "https://www.suse.com/security/cve/CVE-2015-8619" }, { "category": "external", "summary": "SUSE Bug 960334 for CVE-2015-8619", "url": "https://bugzilla.suse.com/960334" }, { "category": "external", "summary": "SUSE Bug 965269 for CVE-2015-8619", "url": "https://bugzilla.suse.com/965269" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "important" } ], "title": "CVE-2015-8619" }, { "cve": "CVE-2015-8743", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8743" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing \u0027ioport\u0027 r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8743", "url": "https://www.suse.com/security/cve/CVE-2015-8743" }, { "category": "external", "summary": "SUSE Bug 960725 for CVE-2015-8743", "url": "https://bugzilla.suse.com/960725" }, { "category": "external", "summary": "SUSE Bug 960726 for CVE-2015-8743", "url": "https://bugzilla.suse.com/960726" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "moderate" } ], "title": "CVE-2015-8743" }, { "cve": "CVE-2015-8744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8744" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8744", "url": "https://www.suse.com/security/cve/CVE-2015-8744" }, { "category": "external", "summary": "SUSE Bug 960835 for CVE-2015-8744", "url": "https://bugzilla.suse.com/960835" }, { "category": "external", "summary": "SUSE Bug 960836 for CVE-2015-8744", "url": "https://bugzilla.suse.com/960836" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "low" } ], "title": "CVE-2015-8744" }, { "cve": "CVE-2015-8745", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8745" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8745", "url": "https://www.suse.com/security/cve/CVE-2015-8745" }, { "category": "external", "summary": "SUSE Bug 960707 for CVE-2015-8745", "url": "https://bugzilla.suse.com/960707" }, { "category": "external", "summary": "SUSE Bug 960708 for CVE-2015-8745", "url": "https://bugzilla.suse.com/960708" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "low" } ], "title": "CVE-2015-8745" }, { "cve": "CVE-2015-8817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8817" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) built to use \u0027address_space_translate\u0027 to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions \u003e= 1.6.0 and \u003c= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8817", "url": "https://www.suse.com/security/cve/CVE-2015-8817" }, { "category": "external", "summary": "SUSE Bug 969121 for CVE-2015-8817", "url": "https://bugzilla.suse.com/969121" }, { "category": "external", "summary": "SUSE Bug 969122 for CVE-2015-8817", "url": "https://bugzilla.suse.com/969122" }, { "category": "external", "summary": "SUSE Bug 969125 for CVE-2015-8817", "url": "https://bugzilla.suse.com/969125" }, { "category": "external", "summary": "SUSE Bug 969126 for CVE-2015-8817", "url": "https://bugzilla.suse.com/969126" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "moderate" } ], "title": "CVE-2015-8817" }, { "cve": "CVE-2015-8818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8818" } ], "notes": [ { "category": "general", "text": "The cpu_physical_memory_write_rom_internal function in exec.c in QEMU (aka Quick Emulator) does not properly skip MMIO regions, which allows local privileged guest users to cause a denial of service (guest crash) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8818", "url": "https://www.suse.com/security/cve/CVE-2015-8818" }, { "category": "external", "summary": "SUSE Bug 969122 for CVE-2015-8818", "url": "https://bugzilla.suse.com/969122" }, { "category": "external", "summary": "SUSE Bug 969125 for CVE-2015-8818", "url": "https://bugzilla.suse.com/969125" }, { "category": "external", "summary": "SUSE Bug 969126 for CVE-2015-8818", "url": "https://bugzilla.suse.com/969126" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "moderate" } ], "title": "CVE-2015-8818" }, { "cve": "CVE-2016-1568", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1568" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1568", "url": "https://www.suse.com/security/cve/CVE-2016-1568" }, { "category": "external", "summary": "SUSE Bug 961332 for CVE-2016-1568", "url": "https://bugzilla.suse.com/961332" }, { "category": "external", "summary": "SUSE Bug 961333 for CVE-2016-1568", "url": "https://bugzilla.suse.com/961333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "moderate" } ], "title": "CVE-2016-1568" }, { "cve": "CVE-2016-1714", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1714" } ], "notes": [ { "category": "general", "text": "The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1714", "url": "https://www.suse.com/security/cve/CVE-2016-1714" }, { "category": "external", "summary": "SUSE Bug 961691 for CVE-2016-1714", "url": "https://bugzilla.suse.com/961691" }, { "category": "external", "summary": "SUSE Bug 961692 for CVE-2016-1714", "url": "https://bugzilla.suse.com/961692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "moderate" } ], "title": "CVE-2016-1714" }, { "cve": "CVE-2016-1922", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1922" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, \u0027current_cpu\u0027 remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1922", "url": "https://www.suse.com/security/cve/CVE-2016-1922" }, { "category": "external", "summary": "SUSE Bug 962320 for CVE-2016-1922", "url": "https://bugzilla.suse.com/962320" }, { "category": "external", "summary": "SUSE Bug 962321 for CVE-2016-1922", "url": "https://bugzilla.suse.com/962321" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "low" } ], "title": "CVE-2016-1922" }, { "cve": "CVE-2016-1981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1981" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1981", "url": "https://www.suse.com/security/cve/CVE-2016-1981" }, { "category": "external", "summary": "SUSE Bug 963782 for CVE-2016-1981", "url": "https://bugzilla.suse.com/963782" }, { "category": "external", "summary": "SUSE Bug 963783 for CVE-2016-1981", "url": "https://bugzilla.suse.com/963783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "low" } ], "title": "CVE-2016-1981" }, { "cve": "CVE-2016-2197", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2197" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) built with an IDE AHCI emulation support is vulnerable to a null pointer dereference flaw. It occurs while unmapping the Frame Information Structure (FIS) and Command List Block (CLB) entries. A privileged user inside guest could use this flaw to crash the QEMU process instance resulting in DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2197", "url": "https://www.suse.com/security/cve/CVE-2016-2197" }, { "category": "external", "summary": "SUSE Bug 964411 for CVE-2016-2197", "url": "https://bugzilla.suse.com/964411" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "low" } ], "title": "CVE-2016-2197" }, { "cve": "CVE-2016-2198", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2198" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) built with the USB EHCI emulation support is vulnerable to a null pointer dereference flaw. It could occur when an application attempts to write to EHCI capabilities registers. A privileged user inside quest could use this flaw to crash the QEMU process instance resulting in DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2198", "url": "https://www.suse.com/security/cve/CVE-2016-2198" }, { "category": "external", "summary": "SUSE Bug 964413 for CVE-2016-2198", "url": "https://bugzilla.suse.com/964413" }, { "category": "external", "summary": "SUSE Bug 964415 for CVE-2016-2198", "url": "https://bugzilla.suse.com/964415" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "low" } ], "title": "CVE-2016-2198" }, { "cve": "CVE-2016-2538", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2538" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 allow local guest OS administrators to cause a denial of service (QEMU process crash) or obtain sensitive host memory information via a remote NDIS control message packet that is mishandled in the (1) rndis_query_response, (2) rndis_set_response, or (3) usb_net_handle_dataout function.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2538", "url": "https://www.suse.com/security/cve/CVE-2016-2538" }, { "category": "external", "summary": "SUSE Bug 967969 for CVE-2016-2538", "url": "https://bugzilla.suse.com/967969" }, { "category": "external", "summary": "SUSE Bug 968004 for CVE-2016-2538", "url": "https://bugzilla.suse.com/968004" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "important" } ], "title": "CVE-2016-2538" }, { "cve": "CVE-2016-2841", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2841" } ], "notes": [ { "category": "general", "text": "The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) in QEMU before 2.5.1 allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2841", "url": "https://www.suse.com/security/cve/CVE-2016-2841" }, { "category": "external", "summary": "SUSE Bug 969350 for CVE-2016-2841", "url": "https://bugzilla.suse.com/969350" }, { "category": "external", "summary": "SUSE Bug 969351 for CVE-2016-2841", "url": "https://bugzilla.suse.com/969351" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "low" } ], "title": "CVE-2016-2841" }, { "cve": "CVE-2016-2857", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2857" } ], "notes": [ { "category": "general", "text": "The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2857", "url": "https://www.suse.com/security/cve/CVE-2016-2857" }, { "category": "external", "summary": "SUSE Bug 970037 for CVE-2016-2857", "url": "https://bugzilla.suse.com/970037" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "low" } ], "title": "CVE-2016-2857" }, { "cve": "CVE-2016-2858", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2858" } ], "notes": [ { "category": "general", "text": "QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2858", "url": "https://www.suse.com/security/cve/CVE-2016-2858" }, { "category": "external", "summary": "SUSE Bug 970036 for CVE-2016-2858", "url": "https://bugzilla.suse.com/970036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "low" } ], "title": "CVE-2016-2858" }, { "cve": "CVE-2016-3710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3710" } ], "notes": [ { "category": "general", "text": "The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \"Dark Portal\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3710", "url": "https://www.suse.com/security/cve/CVE-2016-3710" }, { "category": "external", "summary": "SUSE Bug 978158 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978158" }, { "category": "external", "summary": "SUSE Bug 978164 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978164" }, { "category": "external", "summary": "SUSE Bug 978167 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978167" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "moderate" } ], "title": "CVE-2016-3710" }, { "cve": "CVE-2016-3712", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3712" } ], "notes": [ { "category": "general", "text": "Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3712", "url": "https://www.suse.com/security/cve/CVE-2016-3712" }, { "category": "external", "summary": "SUSE Bug 978160 for CVE-2016-3712", "url": "https://bugzilla.suse.com/978160" }, { "category": "external", "summary": "SUSE Bug 978164 for CVE-2016-3712", "url": "https://bugzilla.suse.com/978164" }, { "category": "external", "summary": "SUSE Bug 978167 for CVE-2016-3712", "url": "https://bugzilla.suse.com/978167" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "low" } ], "title": "CVE-2016-3712" }, { "cve": "CVE-2016-4001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4001" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4001", "url": "https://www.suse.com/security/cve/CVE-2016-4001" }, { "category": "external", "summary": "SUSE Bug 975128 for CVE-2016-4001", "url": "https://bugzilla.suse.com/975128" }, { "category": "external", "summary": "SUSE Bug 975130 for CVE-2016-4001", "url": "https://bugzilla.suse.com/975130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "moderate" } ], "title": "CVE-2016-4001" }, { "cve": "CVE-2016-4002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4002" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4002", "url": "https://www.suse.com/security/cve/CVE-2016-4002" }, { "category": "external", "summary": "SUSE Bug 975136 for CVE-2016-4002", "url": "https://bugzilla.suse.com/975136" }, { "category": "external", "summary": "SUSE Bug 975138 for CVE-2016-4002", "url": "https://bugzilla.suse.com/975138" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "moderate" } ], "title": "CVE-2016-4002" }, { "cve": "CVE-2016-4020", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4020" } ], "notes": [ { "category": "general", "text": "The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4020", "url": "https://www.suse.com/security/cve/CVE-2016-4020" }, { "category": "external", "summary": "SUSE Bug 975700 for CVE-2016-4020", "url": "https://bugzilla.suse.com/975700" }, { "category": "external", "summary": "SUSE Bug 975907 for CVE-2016-4020", "url": "https://bugzilla.suse.com/975907" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "low" } ], "title": "CVE-2016-4020" }, { "cve": "CVE-2016-4037", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4037" } ], "notes": [ { "category": "general", "text": "The ehci_advance_state function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list, a related issue to CVE-2015-8558.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4037", "url": "https://www.suse.com/security/cve/CVE-2016-4037" }, { "category": "external", "summary": "SUSE Bug 959005 for CVE-2016-4037", "url": "https://bugzilla.suse.com/959005" }, { "category": "external", "summary": "SUSE Bug 959006 for CVE-2016-4037", "url": "https://bugzilla.suse.com/959006" }, { "category": "external", "summary": "SUSE Bug 976109 for CVE-2016-4037", "url": "https://bugzilla.suse.com/976109" }, { "category": "external", "summary": "SUSE Bug 976111 for CVE-2016-4037", "url": "https://bugzilla.suse.com/976111" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "low" } ], "title": "CVE-2016-4037" }, { "cve": "CVE-2016-4439", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4439" } ], "notes": [ { "category": "general", "text": "The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4439", "url": "https://www.suse.com/security/cve/CVE-2016-4439" }, { "category": "external", "summary": "SUSE Bug 980711 for CVE-2016-4439", "url": "https://bugzilla.suse.com/980711" }, { "category": "external", "summary": "SUSE Bug 980716 for CVE-2016-4439", "url": "https://bugzilla.suse.com/980716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "low" } ], "title": "CVE-2016-4439" }, { "cve": "CVE-2016-4441", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4441" } ], "notes": [ { "category": "general", "text": "The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4441", "url": "https://www.suse.com/security/cve/CVE-2016-4441" }, { "category": "external", "summary": "SUSE Bug 980723 for CVE-2016-4441", "url": "https://bugzilla.suse.com/980723" }, { "category": "external", "summary": "SUSE Bug 980724 for CVE-2016-4441", "url": "https://bugzilla.suse.com/980724" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "low" } ], "title": "CVE-2016-4441" }, { "cve": "CVE-2016-4952", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4952" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator), when built with VMWARE PVSCSI paravirtual SCSI bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds array access) via vectors related to the (1) PVSCSI_CMD_SETUP_RINGS or (2) PVSCSI_CMD_SETUP_MSG_RING SCSI command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4952", "url": "https://www.suse.com/security/cve/CVE-2016-4952" }, { "category": "external", "summary": "SUSE Bug 981266 for CVE-2016-4952", "url": "https://bugzilla.suse.com/981266" }, { "category": "external", "summary": "SUSE Bug 981276 for CVE-2016-4952", "url": "https://bugzilla.suse.com/981276" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-14.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-29T05:47:55Z", "details": "low" } ], "title": "CVE-2016-4952" } ] }
suse-su-2016:2725-1
Vulnerability from csaf_suse
Published
2016-11-04 10:24
Modified
2016-11-04 10:24
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes several issues.
These security issues were fixed:
- CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792)
- CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785)
- CVE-2016-5403: Unbounded memory allocation allowed a guest administrator to cause a denial of service of the host (bsc#990923)
- CVE-2016-6351: The esp_do_dma function in hw/scsi/esp.c, when built with ESP/NCR53C9x controller emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the host via vectors involving DMA read into ESP command buffer (bsc#990843)
- CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries (bsc#988675)
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the host via vectors related to the information transfer buffer (bsc#983984)
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960)
- CVE-2016-4453: The vmsvga_fifo_run function allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982225)
- CVE-2016-4454: The vmsvga_fifo_read_raw function allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggered an out-of-bounds read (bsc#982224)
- CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264)
- CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724)
- CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716)
- CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the 'Dark Portal' issue (bsc#978164)
- CVE-2016-4480: The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen did not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might have allowed local guest OS users to gain privileges via a crafted mapping of memory (bsc#978295)
- CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038)
- CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188)
- CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130)
- CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138)
These non-security issues were fixed:
- bsc#985503: vif-route broken
- bsc#978413: PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host.
- bsc#954872: Script block-dmmd not working as expected - libxl: error: libxl_dm.c (another modification)
- bsc#961600: Poor performance when Xen HVM domU configured with max memory > current memory
- bsc#963161: Windows VM getting stuck during load while a VF is assigned to it after upgrading to latest maintenance updates
- bsc#976470: Xend fails to start
- bsc#973631: AWS EC2 kdump issue
Patchnames
sleclo50sp3-xen-12836,sleman21-xen-12836,slemap21-xen-12836,sleposp3-xen-12836,slessp3-xen-12836
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes several issues.\n\nThese security issues were fixed:\n- CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792)\n- CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785)\n- CVE-2016-5403: Unbounded memory allocation allowed a guest administrator to cause a denial of service of the host (bsc#990923)\n- CVE-2016-6351: The esp_do_dma function in hw/scsi/esp.c, when built with ESP/NCR53C9x controller emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the host via vectors involving DMA read into ESP command buffer (bsc#990843)\n- CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries (bsc#988675)\n- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the host via vectors related to the information transfer buffer (bsc#983984)\n- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960)\n- CVE-2016-4453: The vmsvga_fifo_run function allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982225)\n- CVE-2016-4454: The vmsvga_fifo_read_raw function allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggered an out-of-bounds read (bsc#982224)\n- CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264)\n- CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724)\n- CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716)\n- CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \u0027Dark Portal\u0027 issue (bsc#978164)\n- CVE-2016-4480: The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen did not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might have allowed local guest OS users to gain privileges via a crafted mapping of memory (bsc#978295)\n- CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038)\n- CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188)\n- CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130)\n- CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138)\n\nThese non-security issues were fixed:\n- bsc#985503: vif-route broken \n- bsc#978413: PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host.\n- bsc#954872: Script block-dmmd not working as expected - libxl: error: libxl_dm.c (another modification) \n- bsc#961600: Poor performance when Xen HVM domU configured with max memory \u003e current memory\n- bsc#963161: Windows VM getting stuck during load while a VF is assigned to it after upgrading to latest maintenance updates\n- bsc#976470: Xend fails to start \n- bsc#973631: AWS EC2 kdump issue\n", "title": "Description of the patch" }, { "category": "details", "text": "sleclo50sp3-xen-12836,sleman21-xen-12836,slemap21-xen-12836,sleposp3-xen-12836,slessp3-xen-12836", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2725-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2725-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162725-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2725-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-November/002394.html" }, { "category": "self", "summary": "SUSE Bug 954872", "url": "https://bugzilla.suse.com/954872" }, { "category": "self", "summary": "SUSE Bug 961600", "url": "https://bugzilla.suse.com/961600" }, { "category": "self", "summary": "SUSE Bug 963161", "url": "https://bugzilla.suse.com/963161" }, { "category": "self", "summary": "SUSE Bug 973188", "url": "https://bugzilla.suse.com/973188" }, { "category": "self", "summary": "SUSE Bug 973631", "url": "https://bugzilla.suse.com/973631" }, { "category": "self", "summary": "SUSE Bug 974038", "url": "https://bugzilla.suse.com/974038" }, { "category": "self", "summary": "SUSE Bug 975130", "url": "https://bugzilla.suse.com/975130" }, { "category": "self", "summary": "SUSE Bug 975138", "url": "https://bugzilla.suse.com/975138" }, { "category": "self", "summary": "SUSE Bug 976470", "url": "https://bugzilla.suse.com/976470" }, { "category": "self", "summary": "SUSE Bug 978164", "url": "https://bugzilla.suse.com/978164" }, { "category": "self", "summary": "SUSE Bug 978295", "url": "https://bugzilla.suse.com/978295" }, { "category": "self", "summary": "SUSE Bug 978413", "url": "https://bugzilla.suse.com/978413" }, { "category": "self", "summary": "SUSE Bug 980716", "url": "https://bugzilla.suse.com/980716" }, { "category": "self", "summary": "SUSE Bug 980724", "url": "https://bugzilla.suse.com/980724" }, { "category": "self", "summary": "SUSE Bug 981264", "url": "https://bugzilla.suse.com/981264" }, { "category": "self", "summary": "SUSE Bug 982224", "url": "https://bugzilla.suse.com/982224" }, { "category": "self", "summary": "SUSE Bug 982225", "url": "https://bugzilla.suse.com/982225" }, { "category": "self", "summary": "SUSE Bug 982960", "url": "https://bugzilla.suse.com/982960" }, { "category": "self", "summary": "SUSE Bug 983984", "url": "https://bugzilla.suse.com/983984" }, { "category": "self", "summary": "SUSE Bug 985503", "url": "https://bugzilla.suse.com/985503" }, { "category": "self", "summary": "SUSE Bug 988675", "url": "https://bugzilla.suse.com/988675" }, { "category": "self", "summary": "SUSE Bug 990843", "url": "https://bugzilla.suse.com/990843" }, { "category": "self", "summary": "SUSE Bug 990923", "url": "https://bugzilla.suse.com/990923" }, { "category": "self", "summary": "SUSE Bug 995785", "url": "https://bugzilla.suse.com/995785" }, { "category": "self", "summary": "SUSE Bug 995792", "url": "https://bugzilla.suse.com/995792" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3615 page", "url": "https://www.suse.com/security/cve/CVE-2014-3615/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3672 page", "url": "https://www.suse.com/security/cve/CVE-2014-3672/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3158 page", "url": "https://www.suse.com/security/cve/CVE-2016-3158/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3159 page", "url": "https://www.suse.com/security/cve/CVE-2016-3159/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3710 page", "url": "https://www.suse.com/security/cve/CVE-2016-3710/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3712 page", "url": "https://www.suse.com/security/cve/CVE-2016-3712/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3960 page", "url": "https://www.suse.com/security/cve/CVE-2016-3960/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4001 page", "url": "https://www.suse.com/security/cve/CVE-2016-4001/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4002 page", "url": "https://www.suse.com/security/cve/CVE-2016-4002/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4439 page", "url": "https://www.suse.com/security/cve/CVE-2016-4439/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4441 page", "url": "https://www.suse.com/security/cve/CVE-2016-4441/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4453 page", "url": "https://www.suse.com/security/cve/CVE-2016-4453/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4454 page", "url": "https://www.suse.com/security/cve/CVE-2016-4454/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4480 page", "url": "https://www.suse.com/security/cve/CVE-2016-4480/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5238 page", "url": "https://www.suse.com/security/cve/CVE-2016-5238/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5338 page", "url": "https://www.suse.com/security/cve/CVE-2016-5338/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5403 page", "url": "https://www.suse.com/security/cve/CVE-2016-5403/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6258 page", "url": "https://www.suse.com/security/cve/CVE-2016-6258/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6351 page", "url": "https://www.suse.com/security/cve/CVE-2016-6351/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7092 page", "url": "https://www.suse.com/security/cve/CVE-2016-7092/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7094 page", "url": "https://www.suse.com/security/cve/CVE-2016-7094/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2016-11-04T10:24:00Z", "generator": { "date": "2016-11-04T10:24:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2725-1", "initial_release_date": "2016-11-04T10:24:00Z", "revision_history": [ { "date": "2016-11-04T10:24:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "product": { "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "product_id": "xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586" } }, { "category": "product_version", "name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "product": { "name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "product_id": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.2.5_21-27.1.i586", "product": { "name": "xen-libs-4.2.5_21-27.1.i586", "product_id": "xen-libs-4.2.5_21-27.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.2.5_21-27.1.i586", "product": { "name": "xen-tools-domU-4.2.5_21-27.1.i586", "product_id": "xen-tools-domU-4.2.5_21-27.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.2.5_21-27.1.x86_64", "product": { "name": "xen-4.2.5_21-27.1.x86_64", "product_id": "xen-4.2.5_21-27.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.2.5_21-27.1.x86_64", "product": { "name": "xen-doc-html-4.2.5_21-27.1.x86_64", "product_id": "xen-doc-html-4.2.5_21-27.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-pdf-4.2.5_21-27.1.x86_64", "product": { "name": "xen-doc-pdf-4.2.5_21-27.1.x86_64", "product_id": "xen-doc-pdf-4.2.5_21-27.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "product": { "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "product_id": "xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.2.5_21-27.1.x86_64", "product": { "name": "xen-libs-4.2.5_21-27.1.x86_64", "product_id": "xen-libs-4.2.5_21-27.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.2.5_21-27.1.x86_64", "product": { "name": "xen-libs-32bit-4.2.5_21-27.1.x86_64", "product_id": "xen-libs-32bit-4.2.5_21-27.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.2.5_21-27.1.x86_64", "product": { "name": "xen-tools-4.2.5_21-27.1.x86_64", "product_id": "xen-tools-4.2.5_21-27.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.2.5_21-27.1.x86_64", "product": { "name": "xen-tools-domU-4.2.5_21-27.1.x86_64", "product_id": "xen-tools-domU-4.2.5_21-27.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 5", "product": { "name": "SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5", "product_identification_helper": { "cpe": "cpe:/o:suse:cloud:5" } } }, { "category": "product_name", "name": "SUSE Manager 2.1", "product": { "name": "SUSE Manager 2.1", "product_id": "SUSE Manager 2.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:2.1" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 2.1", "product": { "name": "SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:2.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.2.5_21-27.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.2.5_21-27.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-doc-html-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.2.5_21-27.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-doc-pdf-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64" }, "product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_21-27.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-libs-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.2.5_21-27.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-libs-32bit-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.2.5_21-27.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-tools-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_21-27.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-tools-domU-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.2.5_21-27.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.2.5_21-27.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-doc-html-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.2.5_21-27.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-doc-pdf-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64" }, "product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_21-27.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-libs-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.2.5_21-27.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-libs-32bit-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.2.5_21-27.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-tools-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_21-27.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-tools-domU-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.2.5_21-27.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.2.5_21-27.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-doc-html-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.2.5_21-27.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-doc-pdf-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64" }, "product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_21-27.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-libs-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.2.5_21-27.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-libs-32bit-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.2.5_21-27.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-tools-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_21-27.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-tools-domU-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586" }, "product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586" }, "product_reference": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_21-27.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586" }, "product_reference": "xen-libs-4.2.5_21-27.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_21-27.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586" }, "product_reference": "xen-tools-domU-4.2.5_21-27.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.2.5_21-27.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.2.5_21-27.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-doc-html-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.2.5_21-27.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-doc-pdf-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586" }, "product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64" }, "product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586" }, "product_reference": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_21-27.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586" }, "product_reference": "xen-libs-4.2.5_21-27.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_21-27.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-libs-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.2.5_21-27.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-libs-32bit-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.2.5_21-27.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-tools-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_21-27.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586" }, "product_reference": "xen-tools-domU-4.2.5_21-27.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_21-27.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64" }, "product_reference": "xen-tools-domU-4.2.5_21-27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-3615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3615" } ], "notes": [ { "category": "general", "text": "The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3615", "url": "https://www.suse.com/security/cve/CVE-2014-3615" }, { "category": "external", "summary": "SUSE Bug 895528 for CVE-2014-3615", "url": "https://bugzilla.suse.com/895528" }, { "category": "external", "summary": "SUSE Bug 918998 for CVE-2014-3615", "url": "https://bugzilla.suse.com/918998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-04T10:24:00Z", "details": "moderate" } ], "title": "CVE-2014-3615" }, { "cve": "CVE-2014-3672", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3672" } ], "notes": [ { "category": "general", "text": "The qemu implementation in libvirt before 1.3.0 and Xen allows local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3672", "url": "https://www.suse.com/security/cve/CVE-2014-3672" }, { "category": "external", "summary": "SUSE Bug 981264 for CVE-2014-3672", "url": "https://bugzilla.suse.com/981264" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-04T10:24:00Z", "details": "low" } ], "title": "CVE-2014-3672" }, { "cve": "CVE-2016-3158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3158" } ], "notes": [ { "category": "general", "text": "The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3158", "url": "https://www.suse.com/security/cve/CVE-2016-3158" }, { "category": "external", "summary": "SUSE Bug 973188 for CVE-2016-3158", "url": "https://bugzilla.suse.com/973188" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-04T10:24:00Z", "details": "low" } ], "title": "CVE-2016-3158" }, { "cve": "CVE-2016-3159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3159" } ], "notes": [ { "category": "general", "text": "The fpu_fxrstor function in arch/x86/i387.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3159", "url": "https://www.suse.com/security/cve/CVE-2016-3159" }, { "category": "external", "summary": "SUSE Bug 973188 for CVE-2016-3159", "url": "https://bugzilla.suse.com/973188" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-04T10:24:00Z", "details": "low" } ], "title": "CVE-2016-3159" }, { "cve": "CVE-2016-3710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3710" } ], "notes": [ { "category": "general", "text": "The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \"Dark Portal\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3710", "url": "https://www.suse.com/security/cve/CVE-2016-3710" }, { "category": "external", "summary": "SUSE Bug 978158 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978158" }, { "category": "external", "summary": "SUSE Bug 978164 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978164" }, { "category": "external", "summary": "SUSE Bug 978167 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978167" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-04T10:24:00Z", "details": "moderate" } ], "title": "CVE-2016-3710" }, { "cve": "CVE-2016-3712", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3712" } ], "notes": [ { "category": "general", "text": "Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3712", "url": "https://www.suse.com/security/cve/CVE-2016-3712" }, { "category": "external", "summary": "SUSE Bug 978160 for CVE-2016-3712", "url": "https://bugzilla.suse.com/978160" }, { "category": "external", "summary": "SUSE Bug 978164 for CVE-2016-3712", "url": "https://bugzilla.suse.com/978164" }, { "category": "external", "summary": "SUSE Bug 978167 for CVE-2016-3712", "url": "https://bugzilla.suse.com/978167" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-04T10:24:00Z", "details": "low" } ], "title": "CVE-2016-3712" }, { "cve": "CVE-2016-3960", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3960" } ], "notes": [ { "category": "general", "text": "Integer overflow in the x86 shadow pagetable code in Xen allows local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3960", "url": "https://www.suse.com/security/cve/CVE-2016-3960" }, { "category": "external", "summary": "SUSE Bug 1072223 for CVE-2016-3960", "url": "https://bugzilla.suse.com/1072223" }, { "category": "external", "summary": "SUSE Bug 974038 for CVE-2016-3960", "url": "https://bugzilla.suse.com/974038" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-04T10:24:00Z", "details": "important" } ], "title": "CVE-2016-3960" }, { "cve": "CVE-2016-4001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4001" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4001", "url": "https://www.suse.com/security/cve/CVE-2016-4001" }, { "category": "external", "summary": "SUSE Bug 975128 for CVE-2016-4001", "url": "https://bugzilla.suse.com/975128" }, { "category": "external", "summary": "SUSE Bug 975130 for CVE-2016-4001", "url": "https://bugzilla.suse.com/975130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-04T10:24:00Z", "details": "moderate" } ], "title": "CVE-2016-4001" }, { "cve": "CVE-2016-4002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4002" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4002", "url": "https://www.suse.com/security/cve/CVE-2016-4002" }, { "category": "external", "summary": "SUSE Bug 975136 for CVE-2016-4002", "url": "https://bugzilla.suse.com/975136" }, { "category": "external", "summary": "SUSE Bug 975138 for CVE-2016-4002", "url": "https://bugzilla.suse.com/975138" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-04T10:24:00Z", "details": "moderate" } ], "title": "CVE-2016-4002" }, { "cve": "CVE-2016-4439", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4439" } ], "notes": [ { "category": "general", "text": "The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4439", "url": "https://www.suse.com/security/cve/CVE-2016-4439" }, { "category": "external", "summary": "SUSE Bug 980711 for CVE-2016-4439", "url": "https://bugzilla.suse.com/980711" }, { "category": "external", "summary": "SUSE Bug 980716 for CVE-2016-4439", "url": "https://bugzilla.suse.com/980716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-04T10:24:00Z", "details": "low" } ], "title": "CVE-2016-4439" }, { "cve": "CVE-2016-4441", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4441" } ], "notes": [ { "category": "general", "text": "The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4441", "url": "https://www.suse.com/security/cve/CVE-2016-4441" }, { "category": "external", "summary": "SUSE Bug 980723 for CVE-2016-4441", "url": "https://bugzilla.suse.com/980723" }, { "category": "external", "summary": "SUSE Bug 980724 for CVE-2016-4441", "url": "https://bugzilla.suse.com/980724" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-04T10:24:00Z", "details": "low" } ], "title": "CVE-2016-4441" }, { "cve": "CVE-2016-4453", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4453" } ], "notes": [ { "category": "general", "text": "The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4453", "url": "https://www.suse.com/security/cve/CVE-2016-4453" }, { "category": "external", "summary": "SUSE Bug 982223 for CVE-2016-4453", "url": "https://bugzilla.suse.com/982223" }, { "category": "external", "summary": "SUSE Bug 982225 for CVE-2016-4453", "url": "https://bugzilla.suse.com/982225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-04T10:24:00Z", "details": "low" } ], "title": "CVE-2016-4453" }, { "cve": "CVE-2016-4454", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4454" } ], "notes": [ { "category": "general", "text": "The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4454", "url": "https://www.suse.com/security/cve/CVE-2016-4454" }, { "category": "external", "summary": "SUSE Bug 982222 for CVE-2016-4454", "url": "https://bugzilla.suse.com/982222" }, { "category": "external", "summary": "SUSE Bug 982224 for CVE-2016-4454", "url": "https://bugzilla.suse.com/982224" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-04T10:24:00Z", "details": "low" } ], "title": "CVE-2016-4454" }, { "cve": "CVE-2016-4480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4480" } ], "notes": [ { "category": "general", "text": "The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4480", "url": "https://www.suse.com/security/cve/CVE-2016-4480" }, { "category": "external", "summary": "SUSE Bug 1072198 for CVE-2016-4480", "url": "https://bugzilla.suse.com/1072198" }, { "category": "external", "summary": "SUSE Bug 1072223 for CVE-2016-4480", "url": "https://bugzilla.suse.com/1072223" }, { "category": "external", "summary": "SUSE Bug 978288 for CVE-2016-4480", "url": "https://bugzilla.suse.com/978288" }, { "category": "external", "summary": "SUSE Bug 978295 for CVE-2016-4480", "url": "https://bugzilla.suse.com/978295" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-04T10:24:00Z", "details": "important" } ], "title": "CVE-2016-4480" }, { "cve": "CVE-2016-5238", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5238" } ], "notes": [ { "category": "general", "text": "The get_cmd function in hw/scsi/esp.c in QEMU might allow local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5238", "url": "https://www.suse.com/security/cve/CVE-2016-5238" }, { "category": "external", "summary": "SUSE Bug 982959 for CVE-2016-5238", "url": "https://bugzilla.suse.com/982959" }, { "category": "external", "summary": "SUSE Bug 982960 for CVE-2016-5238", "url": "https://bugzilla.suse.com/982960" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-04T10:24:00Z", "details": "moderate" } ], "title": "CVE-2016-5238" }, { "cve": "CVE-2016-5338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5338" } ], "notes": [ { "category": "general", "text": "The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5338", "url": "https://www.suse.com/security/cve/CVE-2016-5338" }, { "category": "external", "summary": "SUSE Bug 983982 for CVE-2016-5338", "url": "https://bugzilla.suse.com/983982" }, { "category": "external", "summary": "SUSE Bug 983984 for CVE-2016-5338", "url": "https://bugzilla.suse.com/983984" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-04T10:24:00Z", "details": "low" } ], "title": "CVE-2016-5338" }, { "cve": "CVE-2016-5403", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5403" } ], "notes": [ { "category": "general", "text": "The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5403", "url": "https://www.suse.com/security/cve/CVE-2016-5403" }, { "category": "external", "summary": "SUSE Bug 990923 for CVE-2016-5403", "url": "https://bugzilla.suse.com/990923" }, { "category": "external", "summary": "SUSE Bug 991080 for CVE-2016-5403", "url": "https://bugzilla.suse.com/991080" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-04T10:24:00Z", "details": "low" } ], "title": "CVE-2016-5403" }, { "cve": "CVE-2016-6258", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6258" } ], "notes": [ { "category": "general", "text": "The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6258", "url": "https://www.suse.com/security/cve/CVE-2016-6258" }, { "category": "external", "summary": "SUSE Bug 1072198 for CVE-2016-6258", "url": "https://bugzilla.suse.com/1072198" }, { "category": "external", "summary": "SUSE Bug 1072223 for CVE-2016-6258", "url": "https://bugzilla.suse.com/1072223" }, { "category": "external", "summary": "SUSE Bug 988675 for CVE-2016-6258", "url": "https://bugzilla.suse.com/988675" }, { "category": "external", "summary": "SUSE Bug 988692 for CVE-2016-6258", "url": "https://bugzilla.suse.com/988692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-04T10:24:00Z", "details": "important" } ], "title": "CVE-2016-6258" }, { "cve": "CVE-2016-6351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6351" } ], "notes": [ { "category": "general", "text": "The esp_do_dma function in hw/scsi/esp.c in QEMU (aka Quick Emulator), when built with ESP/NCR53C9x controller emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the QEMU host via vectors involving DMA read into ESP command buffer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6351", "url": "https://www.suse.com/security/cve/CVE-2016-6351" }, { "category": "external", "summary": "SUSE Bug 990835 for CVE-2016-6351", "url": "https://bugzilla.suse.com/990835" }, { "category": "external", "summary": "SUSE Bug 990843 for CVE-2016-6351", "url": "https://bugzilla.suse.com/990843" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-04T10:24:00Z", "details": "low" } ], "title": "CVE-2016-6351" }, { "cve": "CVE-2016-7092", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7092" } ], "notes": [ { "category": "general", "text": "The get_page_from_l3e function in arch/x86/mm.c in Xen allows local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7092", "url": "https://www.suse.com/security/cve/CVE-2016-7092" }, { "category": "external", "summary": "SUSE Bug 995785 for CVE-2016-7092", "url": "https://bugzilla.suse.com/995785" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-04T10:24:00Z", "details": "important" } ], "title": "CVE-2016-7092" }, { "cve": "CVE-2016-7094", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7094" } ], "notes": [ { "category": "general", "text": "Buffer overflow in Xen 4.7.x and earlier allows local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7094", "url": "https://www.suse.com/security/cve/CVE-2016-7094" }, { "category": "external", "summary": "SUSE Bug 995792 for CVE-2016-7094", "url": "https://bugzilla.suse.com/995792" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-libs-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-4.2.5_21-27.1.x86_64", "SUSE Manager Proxy 2.1:xen-tools-domU-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-html-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-doc-pdf-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-32bit-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-libs-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-4.2.5_21-27.1.x86_64", "SUSE OpenStack Cloud 5:xen-tools-domU-4.2.5_21-27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-04T10:24:00Z", "details": "moderate" } ], "title": "CVE-2016-7094" } ] }
suse-su-2016:1560-1
Vulnerability from csaf_suse
Published
2016-06-13 07:13
Modified
2016-06-13 07:13
Summary
Security update for qemu
Notes
Title of the patch
Security update for qemu
Description of the patch
qemu was updated to fix 37 security issues.
These security issues were fixed:
- CVE-2016-4439: Avoid OOB access in 53C9X emulation (bsc#980711)
- CVE-2016-4441: Avoid OOB access in 53C9X emulation (bsc#980723)
- CVE-2016-4952: Avoid OOB access in Vmware PV SCSI emulation (bsc#981266)
- CVE-2015-8817: Avoid OOB access in PCI DMA I/O (bsc#969121)
- CVE-2015-8818: Avoid OOB access in PCI DMA I/O (bsc#969122)
- CVE-2016-3710: Fixed VGA emulation based OOB access with potential for guest escape (bsc#978158)
- CVE-2016-3712: Fixed VGa emulation based DOS and OOB read access exploit (bsc#978160)
- CVE-2016-4037: Fixed USB ehci based DOS (bsc#976109)
- CVE-2016-2538: Fixed potential OOB access in USB net device emulation (bsc#967969)
- CVE-2016-2841: Fixed OOB access / hang in ne2000 emulation (bsc#969350)
- CVE-2016-2858: Avoid potential DOS when using QEMU pseudo random number generator (bsc#970036)
- CVE-2016-2857: Fixed OOB access when processing IP checksums (bsc#970037)
- CVE-2016-4001: Fixed OOB access in Stellaris enet emulated nic (bsc#975128)
- CVE-2016-4002: Fixed OOB access in MIPSnet emulated controller (bsc#975136)
- CVE-2016-4020: Fixed possible host data leakage to guest from TPR access (bsc#975700)
- CVE-2015-3214: Fixed OOB read in i8254 PIC (bsc#934069)
- CVE-2014-9718: Fixed the handling of malformed or short ide PRDTs to avoid any opportunity for guest to cause DoS by abusing that interface (bsc#928393)
- CVE-2014-3689: Fixed insufficient parameter validation in rectangle functions (bsc#901508)
- CVE-2014-3615: The VGA emulator in QEMU allowed local guest users to read host memory by setting the display to a high resolution (bsc#895528).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
- CVE-2015-5745: Buffer overflow in virtio-serial (bsc#940929).
- CVE-2015-7295: hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allowed remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface (bsc#947159).
- CVE-2015-7549: PCI null pointer dereferences (bsc#958917).
- CVE-2015-8504: VNC floating point exception (bsc#958491).
- CVE-2015-8558: Infinite loop in ehci_advance_state resulting in DoS (bsc#959005).
- CVE-2015-8567: A guest repeatedly activating a vmxnet3 device can leak host memory (bsc#959386).
- CVE-2015-8568: A guest repeatedly activating a vmxnet3 device can leak host memory (bsc#959386).
- CVE-2015-8613: Wrong sized memset in megasas command handler (bsc#961358).
- CVE-2015-8619: Potential DoS for long HMP sendkey command argument (bsc#960334).
- CVE-2015-8743: OOB memory access in ne2000 ioport r/w functions (bsc#960725).
- CVE-2015-8744: Incorrect l2 header validation could have lead to a crash via assert(2) call (bsc#960835).
- CVE-2015-8745: Reading IMR registers could have lead to a crash via assert(2) call (bsc#960708).
- CVE-2016-1568: AHCI use-after-free in aio port commands (bsc#961332).
- CVE-2016-1714: Potential OOB memory access in processing firmware configuration (bsc#961691).
- CVE-2016-1922: NULL pointer dereference when processing hmp i/o command (bsc#962320).
- CVE-2016-1981: Potential DoS (infinite loop) in e1000 device emulation by malicious privileged user within guest (bsc#963782).
- CVE-2016-2198: Malicious privileged guest user were able to cause DoS by writing to read-only EHCI capabilities registers (bsc#964413).
This non-security issue was fixed
- bsc#886378: qemu truncates vhd images in virt-rescue
Patchnames
SUSE-SLE-DESKTOP-12-2016-924,SUSE-SLE-SERVER-12-2016-924
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for qemu", "title": "Title of the patch" }, { "category": "description", "text": "qemu was updated to fix 37 security issues.\n\nThese security issues were fixed:\n- CVE-2016-4439: Avoid OOB access in 53C9X emulation (bsc#980711)\n- CVE-2016-4441: Avoid OOB access in 53C9X emulation (bsc#980723)\n- CVE-2016-4952: Avoid OOB access in Vmware PV SCSI emulation (bsc#981266)\n- CVE-2015-8817: Avoid OOB access in PCI DMA I/O (bsc#969121)\n- CVE-2015-8818: Avoid OOB access in PCI DMA I/O (bsc#969122)\n- CVE-2016-3710: Fixed VGA emulation based OOB access with potential for guest escape (bsc#978158)\n- CVE-2016-3712: Fixed VGa emulation based DOS and OOB read access exploit (bsc#978160)\n- CVE-2016-4037: Fixed USB ehci based DOS (bsc#976109)\n- CVE-2016-2538: Fixed potential OOB access in USB net device emulation (bsc#967969)\n- CVE-2016-2841: Fixed OOB access / hang in ne2000 emulation (bsc#969350)\n- CVE-2016-2858: Avoid potential DOS when using QEMU pseudo random number generator (bsc#970036)\n- CVE-2016-2857: Fixed OOB access when processing IP checksums (bsc#970037)\n- CVE-2016-4001: Fixed OOB access in Stellaris enet emulated nic (bsc#975128)\n- CVE-2016-4002: Fixed OOB access in MIPSnet emulated controller (bsc#975136)\n- CVE-2016-4020: Fixed possible host data leakage to guest from TPR access (bsc#975700)\n- CVE-2015-3214: Fixed OOB read in i8254 PIC (bsc#934069)\n- CVE-2014-9718: Fixed the handling of malformed or short ide PRDTs to avoid any opportunity for guest to cause DoS by abusing that interface (bsc#928393)\n- CVE-2014-3689: Fixed insufficient parameter validation in rectangle functions (bsc#901508)\n- CVE-2014-3615: The VGA emulator in QEMU allowed local guest users to read host memory by setting the display to a high resolution (bsc#895528).\n- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).\n- CVE-2015-5745: Buffer overflow in virtio-serial (bsc#940929).\n- CVE-2015-7295: hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allowed remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface (bsc#947159).\n- CVE-2015-7549: PCI null pointer dereferences (bsc#958917).\n- CVE-2015-8504: VNC floating point exception (bsc#958491).\n- CVE-2015-8558: Infinite loop in ehci_advance_state resulting in DoS (bsc#959005).\n- CVE-2015-8567: A guest repeatedly activating a vmxnet3 device can leak host memory (bsc#959386).\n- CVE-2015-8568: A guest repeatedly activating a vmxnet3 device can leak host memory (bsc#959386).\n- CVE-2015-8613: Wrong sized memset in megasas command handler (bsc#961358).\n- CVE-2015-8619: Potential DoS for long HMP sendkey command argument (bsc#960334).\n- CVE-2015-8743: OOB memory access in ne2000 ioport r/w functions (bsc#960725).\n- CVE-2015-8744: Incorrect l2 header validation could have lead to a crash via assert(2) call (bsc#960835).\n- CVE-2015-8745: Reading IMR registers could have lead to a crash via assert(2) call (bsc#960708).\n- CVE-2016-1568: AHCI use-after-free in aio port commands (bsc#961332).\n- CVE-2016-1714: Potential OOB memory access in processing firmware configuration (bsc#961691).\n- CVE-2016-1922: NULL pointer dereference when processing hmp i/o command (bsc#962320).\n- CVE-2016-1981: Potential DoS (infinite loop) in e1000 device emulation by malicious privileged user within guest (bsc#963782).\n- CVE-2016-2198: Malicious privileged guest user were able to cause DoS by writing to read-only EHCI capabilities registers (bsc#964413).\n\nThis non-security issue was fixed\n- bsc#886378: qemu truncates vhd images in virt-rescue\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-2016-924,SUSE-SLE-SERVER-12-2016-924", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1560-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1560-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161560-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1560-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" }, { "category": "self", "summary": "SUSE Bug 886378", "url": "https://bugzilla.suse.com/886378" }, { "category": "self", "summary": "SUSE Bug 895528", "url": "https://bugzilla.suse.com/895528" }, { "category": "self", "summary": "SUSE Bug 901508", "url": "https://bugzilla.suse.com/901508" }, { "category": "self", "summary": "SUSE Bug 928393", "url": "https://bugzilla.suse.com/928393" }, { "category": "self", "summary": "SUSE Bug 934069", "url": "https://bugzilla.suse.com/934069" }, { "category": "self", "summary": "SUSE Bug 940929", "url": "https://bugzilla.suse.com/940929" }, { "category": "self", "summary": "SUSE Bug 944463", "url": "https://bugzilla.suse.com/944463" }, { "category": "self", "summary": "SUSE Bug 947159", "url": "https://bugzilla.suse.com/947159" }, { "category": "self", "summary": "SUSE Bug 958491", "url": "https://bugzilla.suse.com/958491" }, { "category": "self", "summary": "SUSE Bug 958917", "url": "https://bugzilla.suse.com/958917" }, { "category": "self", "summary": "SUSE Bug 959005", "url": "https://bugzilla.suse.com/959005" }, { "category": "self", "summary": "SUSE Bug 959386", "url": "https://bugzilla.suse.com/959386" }, { "category": "self", "summary": "SUSE Bug 960334", "url": "https://bugzilla.suse.com/960334" }, { "category": "self", "summary": "SUSE Bug 960708", "url": "https://bugzilla.suse.com/960708" }, { "category": "self", "summary": "SUSE Bug 960725", "url": "https://bugzilla.suse.com/960725" }, { "category": "self", "summary": "SUSE Bug 960835", "url": "https://bugzilla.suse.com/960835" }, { "category": "self", "summary": "SUSE Bug 961332", "url": "https://bugzilla.suse.com/961332" }, { "category": "self", "summary": "SUSE Bug 961333", "url": "https://bugzilla.suse.com/961333" }, { "category": "self", "summary": "SUSE Bug 961358", "url": "https://bugzilla.suse.com/961358" }, { "category": "self", "summary": "SUSE Bug 961556", "url": "https://bugzilla.suse.com/961556" }, { "category": "self", "summary": "SUSE Bug 961691", "url": "https://bugzilla.suse.com/961691" }, { "category": "self", "summary": "SUSE Bug 962320", "url": "https://bugzilla.suse.com/962320" }, { "category": "self", "summary": "SUSE Bug 963782", "url": "https://bugzilla.suse.com/963782" }, { "category": "self", "summary": "SUSE Bug 964413", "url": "https://bugzilla.suse.com/964413" }, { "category": "self", "summary": "SUSE Bug 967969", "url": "https://bugzilla.suse.com/967969" }, { "category": "self", "summary": "SUSE Bug 969121", "url": "https://bugzilla.suse.com/969121" }, { "category": "self", "summary": "SUSE Bug 969122", "url": "https://bugzilla.suse.com/969122" }, { "category": "self", "summary": "SUSE Bug 969350", "url": "https://bugzilla.suse.com/969350" }, { "category": "self", "summary": "SUSE Bug 970036", "url": "https://bugzilla.suse.com/970036" }, { "category": "self", "summary": "SUSE Bug 970037", "url": "https://bugzilla.suse.com/970037" }, { "category": "self", "summary": "SUSE Bug 975128", "url": "https://bugzilla.suse.com/975128" }, { "category": "self", "summary": "SUSE Bug 975136", "url": "https://bugzilla.suse.com/975136" }, { "category": "self", "summary": "SUSE Bug 975700", "url": "https://bugzilla.suse.com/975700" }, { "category": "self", "summary": "SUSE Bug 976109", "url": "https://bugzilla.suse.com/976109" }, { "category": "self", "summary": "SUSE Bug 978158", "url": "https://bugzilla.suse.com/978158" }, { "category": "self", "summary": "SUSE Bug 978160", "url": "https://bugzilla.suse.com/978160" }, { "category": "self", "summary": "SUSE Bug 980711", "url": "https://bugzilla.suse.com/980711" }, { "category": "self", "summary": "SUSE Bug 980723", "url": "https://bugzilla.suse.com/980723" }, { "category": "self", "summary": "SUSE Bug 981266", "url": "https://bugzilla.suse.com/981266" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3615 page", "url": "https://www.suse.com/security/cve/CVE-2014-3615/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3689 page", "url": "https://www.suse.com/security/cve/CVE-2014-3689/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9718 page", "url": "https://www.suse.com/security/cve/CVE-2014-9718/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3214 page", "url": "https://www.suse.com/security/cve/CVE-2015-3214/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5239 page", "url": "https://www.suse.com/security/cve/CVE-2015-5239/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5745 page", "url": "https://www.suse.com/security/cve/CVE-2015-5745/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7295 page", "url": "https://www.suse.com/security/cve/CVE-2015-7295/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7549 page", "url": "https://www.suse.com/security/cve/CVE-2015-7549/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8504 page", "url": "https://www.suse.com/security/cve/CVE-2015-8504/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8558 page", "url": "https://www.suse.com/security/cve/CVE-2015-8558/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8567 page", "url": "https://www.suse.com/security/cve/CVE-2015-8567/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8568 page", "url": "https://www.suse.com/security/cve/CVE-2015-8568/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8613 page", "url": "https://www.suse.com/security/cve/CVE-2015-8613/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8619 page", "url": "https://www.suse.com/security/cve/CVE-2015-8619/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8743 page", "url": "https://www.suse.com/security/cve/CVE-2015-8743/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8744 page", "url": "https://www.suse.com/security/cve/CVE-2015-8744/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8745 page", "url": "https://www.suse.com/security/cve/CVE-2015-8745/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8817 page", "url": "https://www.suse.com/security/cve/CVE-2015-8817/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8818 page", "url": "https://www.suse.com/security/cve/CVE-2015-8818/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1568 page", "url": "https://www.suse.com/security/cve/CVE-2016-1568/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1714 page", "url": "https://www.suse.com/security/cve/CVE-2016-1714/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1922 page", "url": "https://www.suse.com/security/cve/CVE-2016-1922/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1981 page", "url": "https://www.suse.com/security/cve/CVE-2016-1981/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2198 page", "url": "https://www.suse.com/security/cve/CVE-2016-2198/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2538 page", "url": "https://www.suse.com/security/cve/CVE-2016-2538/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2841 page", "url": "https://www.suse.com/security/cve/CVE-2016-2841/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2857 page", "url": "https://www.suse.com/security/cve/CVE-2016-2857/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2858 page", "url": "https://www.suse.com/security/cve/CVE-2016-2858/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3710 page", "url": "https://www.suse.com/security/cve/CVE-2016-3710/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3712 page", "url": "https://www.suse.com/security/cve/CVE-2016-3712/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4001 page", "url": "https://www.suse.com/security/cve/CVE-2016-4001/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4002 page", "url": "https://www.suse.com/security/cve/CVE-2016-4002/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4020 page", "url": "https://www.suse.com/security/cve/CVE-2016-4020/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4037 page", "url": "https://www.suse.com/security/cve/CVE-2016-4037/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4439 page", "url": "https://www.suse.com/security/cve/CVE-2016-4439/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4441 page", "url": "https://www.suse.com/security/cve/CVE-2016-4441/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4952 page", "url": "https://www.suse.com/security/cve/CVE-2016-4952/" } ], "title": "Security update for qemu", "tracking": { "current_release_date": "2016-06-13T07:13:18Z", "generator": { "date": "2016-06-13T07:13:18Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1560-1", "initial_release_date": "2016-06-13T07:13:18Z", "revision_history": [ { "date": "2016-06-13T07:13:18Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "qemu-ipxe-1.0.0-48.19.1.noarch", "product": { "name": "qemu-ipxe-1.0.0-48.19.1.noarch", "product_id": "qemu-ipxe-1.0.0-48.19.1.noarch" } }, { "category": "product_version", "name": "qemu-seabios-1.7.4-48.19.1.noarch", "product": { "name": "qemu-seabios-1.7.4-48.19.1.noarch", "product_id": "qemu-seabios-1.7.4-48.19.1.noarch" } }, { "category": "product_version", "name": "qemu-sgabios-8-48.19.1.noarch", "product": { "name": "qemu-sgabios-8-48.19.1.noarch", "product_id": "qemu-sgabios-8-48.19.1.noarch" } }, { "category": "product_version", "name": "qemu-vgabios-1.7.4-48.19.1.noarch", "product": { "name": "qemu-vgabios-1.7.4-48.19.1.noarch", "product_id": "qemu-vgabios-1.7.4-48.19.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "qemu-2.0.2-48.19.1.ppc64le", "product": { "name": "qemu-2.0.2-48.19.1.ppc64le", "product_id": "qemu-2.0.2-48.19.1.ppc64le" } }, { "category": "product_version", "name": "qemu-block-curl-2.0.2-48.19.1.ppc64le", "product": { "name": "qemu-block-curl-2.0.2-48.19.1.ppc64le", "product_id": "qemu-block-curl-2.0.2-48.19.1.ppc64le" } }, { "category": "product_version", "name": "qemu-guest-agent-2.0.2-48.19.1.ppc64le", "product": { "name": "qemu-guest-agent-2.0.2-48.19.1.ppc64le", "product_id": "qemu-guest-agent-2.0.2-48.19.1.ppc64le" } }, { "category": "product_version", "name": "qemu-lang-2.0.2-48.19.1.ppc64le", "product": { "name": "qemu-lang-2.0.2-48.19.1.ppc64le", "product_id": "qemu-lang-2.0.2-48.19.1.ppc64le" } }, { "category": "product_version", "name": "qemu-ppc-2.0.2-48.19.1.ppc64le", "product": { "name": "qemu-ppc-2.0.2-48.19.1.ppc64le", "product_id": "qemu-ppc-2.0.2-48.19.1.ppc64le" } }, { "category": "product_version", "name": "qemu-tools-2.0.2-48.19.1.ppc64le", "product": { "name": "qemu-tools-2.0.2-48.19.1.ppc64le", "product_id": "qemu-tools-2.0.2-48.19.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "qemu-2.0.2-48.19.1.s390x", "product": { "name": "qemu-2.0.2-48.19.1.s390x", "product_id": "qemu-2.0.2-48.19.1.s390x" } }, { "category": "product_version", "name": "qemu-block-curl-2.0.2-48.19.1.s390x", "product": { "name": "qemu-block-curl-2.0.2-48.19.1.s390x", "product_id": "qemu-block-curl-2.0.2-48.19.1.s390x" } }, { "category": "product_version", "name": "qemu-guest-agent-2.0.2-48.19.1.s390x", "product": { "name": "qemu-guest-agent-2.0.2-48.19.1.s390x", "product_id": "qemu-guest-agent-2.0.2-48.19.1.s390x" } }, { "category": "product_version", "name": "qemu-kvm-2.0.2-48.19.1.s390x", "product": { "name": "qemu-kvm-2.0.2-48.19.1.s390x", "product_id": "qemu-kvm-2.0.2-48.19.1.s390x" } }, { "category": "product_version", "name": "qemu-lang-2.0.2-48.19.1.s390x", "product": { "name": "qemu-lang-2.0.2-48.19.1.s390x", "product_id": "qemu-lang-2.0.2-48.19.1.s390x" } }, { "category": "product_version", "name": "qemu-s390-2.0.2-48.19.1.s390x", "product": { "name": "qemu-s390-2.0.2-48.19.1.s390x", "product_id": "qemu-s390-2.0.2-48.19.1.s390x" } }, { "category": "product_version", "name": "qemu-tools-2.0.2-48.19.1.s390x", "product": { "name": "qemu-tools-2.0.2-48.19.1.s390x", "product_id": "qemu-tools-2.0.2-48.19.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "qemu-2.0.2-48.19.1.x86_64", "product": { "name": "qemu-2.0.2-48.19.1.x86_64", "product_id": "qemu-2.0.2-48.19.1.x86_64" } }, { "category": "product_version", "name": "qemu-block-curl-2.0.2-48.19.1.x86_64", "product": { "name": "qemu-block-curl-2.0.2-48.19.1.x86_64", "product_id": "qemu-block-curl-2.0.2-48.19.1.x86_64" } }, { "category": "product_version", "name": "qemu-kvm-2.0.2-48.19.1.x86_64", "product": { "name": "qemu-kvm-2.0.2-48.19.1.x86_64", "product_id": "qemu-kvm-2.0.2-48.19.1.x86_64" } }, { "category": "product_version", "name": "qemu-tools-2.0.2-48.19.1.x86_64", "product": { "name": "qemu-tools-2.0.2-48.19.1.x86_64", "product_id": "qemu-tools-2.0.2-48.19.1.x86_64" } }, { "category": "product_version", "name": "qemu-x86-2.0.2-48.19.1.x86_64", "product": { "name": "qemu-x86-2.0.2-48.19.1.x86_64", "product_id": "qemu-x86-2.0.2-48.19.1.x86_64" } }, { "category": "product_version", "name": "qemu-block-rbd-2.0.2-48.19.1.x86_64", "product": { "name": "qemu-block-rbd-2.0.2-48.19.1.x86_64", "product_id": "qemu-block-rbd-2.0.2-48.19.1.x86_64" } }, { "category": "product_version", "name": "qemu-guest-agent-2.0.2-48.19.1.x86_64", "product": { "name": "qemu-guest-agent-2.0.2-48.19.1.x86_64", "product_id": "qemu-guest-agent-2.0.2-48.19.1.x86_64" } }, { "category": "product_version", "name": "qemu-lang-2.0.2-48.19.1.x86_64", "product": { "name": "qemu-lang-2.0.2-48.19.1.x86_64", "product_id": "qemu-lang-2.0.2-48.19.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12", "product": { "name": "SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12", "product": { "name": "SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-2.0.2-48.19.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64" }, "product_reference": "qemu-2.0.2-48.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.0.2-48.19.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64" }, "product_reference": "qemu-block-curl-2.0.2-48.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-ipxe-1.0.0-48.19.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch" }, "product_reference": "qemu-ipxe-1.0.0-48.19.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2.0.2-48.19.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64" }, "product_reference": "qemu-kvm-2.0.2-48.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-seabios-1.7.4-48.19.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch" }, "product_reference": "qemu-seabios-1.7.4-48.19.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-sgabios-8-48.19.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch" }, "product_reference": "qemu-sgabios-8-48.19.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.0.2-48.19.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64" }, "product_reference": "qemu-tools-2.0.2-48.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-vgabios-1.7.4-48.19.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch" }, "product_reference": "qemu-vgabios-1.7.4-48.19.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-x86-2.0.2-48.19.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64" }, "product_reference": "qemu-x86-2.0.2-48.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-2.0.2-48.19.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le" }, "product_reference": "qemu-2.0.2-48.19.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-2.0.2-48.19.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x" }, "product_reference": "qemu-2.0.2-48.19.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-2.0.2-48.19.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64" }, "product_reference": "qemu-2.0.2-48.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.0.2-48.19.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le" }, "product_reference": "qemu-block-curl-2.0.2-48.19.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.0.2-48.19.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x" }, "product_reference": "qemu-block-curl-2.0.2-48.19.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.0.2-48.19.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64" }, "product_reference": "qemu-block-curl-2.0.2-48.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-rbd-2.0.2-48.19.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64" }, "product_reference": "qemu-block-rbd-2.0.2-48.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2.0.2-48.19.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le" }, "product_reference": "qemu-guest-agent-2.0.2-48.19.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2.0.2-48.19.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x" }, "product_reference": "qemu-guest-agent-2.0.2-48.19.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2.0.2-48.19.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64" }, "product_reference": "qemu-guest-agent-2.0.2-48.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-ipxe-1.0.0-48.19.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch" }, "product_reference": "qemu-ipxe-1.0.0-48.19.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2.0.2-48.19.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x" }, "product_reference": "qemu-kvm-2.0.2-48.19.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2.0.2-48.19.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64" }, "product_reference": "qemu-kvm-2.0.2-48.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-lang-2.0.2-48.19.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le" }, "product_reference": "qemu-lang-2.0.2-48.19.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-lang-2.0.2-48.19.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x" }, "product_reference": "qemu-lang-2.0.2-48.19.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-lang-2.0.2-48.19.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64" }, "product_reference": "qemu-lang-2.0.2-48.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-ppc-2.0.2-48.19.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le" }, "product_reference": "qemu-ppc-2.0.2-48.19.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-s390-2.0.2-48.19.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x" }, "product_reference": "qemu-s390-2.0.2-48.19.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-seabios-1.7.4-48.19.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch" }, "product_reference": "qemu-seabios-1.7.4-48.19.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-sgabios-8-48.19.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch" }, "product_reference": "qemu-sgabios-8-48.19.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.0.2-48.19.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le" }, "product_reference": "qemu-tools-2.0.2-48.19.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.0.2-48.19.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x" }, "product_reference": "qemu-tools-2.0.2-48.19.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.0.2-48.19.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64" }, "product_reference": "qemu-tools-2.0.2-48.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-vgabios-1.7.4-48.19.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch" }, "product_reference": "qemu-vgabios-1.7.4-48.19.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-x86-2.0.2-48.19.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64" }, "product_reference": "qemu-x86-2.0.2-48.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-2.0.2-48.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le" }, "product_reference": "qemu-2.0.2-48.19.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-2.0.2-48.19.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x" }, "product_reference": "qemu-2.0.2-48.19.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-2.0.2-48.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64" }, "product_reference": "qemu-2.0.2-48.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.0.2-48.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le" }, "product_reference": "qemu-block-curl-2.0.2-48.19.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.0.2-48.19.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x" }, "product_reference": "qemu-block-curl-2.0.2-48.19.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-curl-2.0.2-48.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64" }, "product_reference": "qemu-block-curl-2.0.2-48.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-block-rbd-2.0.2-48.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64" }, "product_reference": "qemu-block-rbd-2.0.2-48.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2.0.2-48.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le" }, "product_reference": "qemu-guest-agent-2.0.2-48.19.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2.0.2-48.19.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x" }, "product_reference": "qemu-guest-agent-2.0.2-48.19.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2.0.2-48.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64" }, "product_reference": "qemu-guest-agent-2.0.2-48.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-ipxe-1.0.0-48.19.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch" }, "product_reference": "qemu-ipxe-1.0.0-48.19.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2.0.2-48.19.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x" }, "product_reference": "qemu-kvm-2.0.2-48.19.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2.0.2-48.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64" }, "product_reference": "qemu-kvm-2.0.2-48.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-lang-2.0.2-48.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le" }, "product_reference": "qemu-lang-2.0.2-48.19.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-lang-2.0.2-48.19.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x" }, "product_reference": "qemu-lang-2.0.2-48.19.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-lang-2.0.2-48.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64" }, "product_reference": "qemu-lang-2.0.2-48.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-ppc-2.0.2-48.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le" }, "product_reference": "qemu-ppc-2.0.2-48.19.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-s390-2.0.2-48.19.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x" }, "product_reference": "qemu-s390-2.0.2-48.19.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-seabios-1.7.4-48.19.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch" }, "product_reference": "qemu-seabios-1.7.4-48.19.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-sgabios-8-48.19.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch" }, "product_reference": "qemu-sgabios-8-48.19.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.0.2-48.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le" }, "product_reference": "qemu-tools-2.0.2-48.19.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.0.2-48.19.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x" }, "product_reference": "qemu-tools-2.0.2-48.19.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-tools-2.0.2-48.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64" }, "product_reference": "qemu-tools-2.0.2-48.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-vgabios-1.7.4-48.19.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch" }, "product_reference": "qemu-vgabios-1.7.4-48.19.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-x86-2.0.2-48.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" }, "product_reference": "qemu-x86-2.0.2-48.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-3615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3615" } ], "notes": [ { "category": "general", "text": "The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3615", "url": "https://www.suse.com/security/cve/CVE-2014-3615" }, { "category": "external", "summary": "SUSE Bug 895528 for CVE-2014-3615", "url": "https://bugzilla.suse.com/895528" }, { "category": "external", "summary": "SUSE Bug 918998 for CVE-2014-3615", "url": "https://bugzilla.suse.com/918998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "moderate" } ], "title": "CVE-2014-3615" }, { "cve": "CVE-2014-3689", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3689" } ], "notes": [ { "category": "general", "text": "The vmware-vga driver (hw/display/vmware_vga.c) in QEMU allows local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3689", "url": "https://www.suse.com/security/cve/CVE-2014-3689" }, { "category": "external", "summary": "SUSE Bug 1072223 for CVE-2014-3689", "url": "https://bugzilla.suse.com/1072223" }, { "category": "external", "summary": "SUSE Bug 1189862 for CVE-2014-3689", "url": "https://bugzilla.suse.com/1189862" }, { "category": "external", "summary": "SUSE Bug 901508 for CVE-2014-3689", "url": "https://bugzilla.suse.com/901508" }, { "category": "external", "summary": "SUSE Bug 962611 for CVE-2014-3689", "url": "https://bugzilla.suse.com/962611" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "important" } ], "title": "CVE-2014-3689" }, { "cve": "CVE-2014-9718", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9718" } ], "notes": [ { "category": "general", "text": "The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality in QEMU 1.0 through 2.1.3 have multiple interpretations of a function\u0027s return value, which allows guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related to the bmdma_prepare_buf and ahci_dma_prepare_buf functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9718", "url": "https://www.suse.com/security/cve/CVE-2014-9718" }, { "category": "external", "summary": "SUSE Bug 928393 for CVE-2014-9718", "url": "https://bugzilla.suse.com/928393" }, { "category": "external", "summary": "SUSE Bug 964431 for CVE-2014-9718", "url": "https://bugzilla.suse.com/964431" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "moderate" } ], "title": "CVE-2014-9718" }, { "cve": "CVE-2015-3214", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3214" } ], "notes": [ { "category": "general", "text": "The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3214", "url": "https://www.suse.com/security/cve/CVE-2015-3214" }, { "category": "external", "summary": "SUSE Bug 934069 for CVE-2015-3214", "url": "https://bugzilla.suse.com/934069" }, { "category": "external", "summary": "SUSE Bug 936025 for CVE-2015-3214", "url": "https://bugzilla.suse.com/936025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "moderate" } ], "title": "CVE-2015-3214" }, { "cve": "CVE-2015-5239", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5239" } ], "notes": [ { "category": "general", "text": "Integer overflow in the VNC display driver in QEMU before 2.1.0 allows attachers to cause a denial of service (process crash) via a CLIENT_CUT_TEXT message, which triggers an infinite loop.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5239", "url": "https://www.suse.com/security/cve/CVE-2015-5239" }, { "category": "external", "summary": "SUSE Bug 944463 for CVE-2015-5239", "url": "https://bugzilla.suse.com/944463" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2015-5239", "url": "https://bugzilla.suse.com/950367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "moderate" } ], "title": "CVE-2015-5239" }, { "cve": "CVE-2015-5745", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5745" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU before 2.4.0 allows guest users to cause a denial of service (QEMU process crash) via a crafted virtio control message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5745", "url": "https://www.suse.com/security/cve/CVE-2015-5745" }, { "category": "external", "summary": "SUSE Bug 940929 for CVE-2015-5745", "url": "https://bugzilla.suse.com/940929" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2015-5745", "url": "https://bugzilla.suse.com/950367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "low" } ], "title": "CVE-2015-5745" }, { "cve": "CVE-2015-7295", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7295" } ], "notes": [ { "category": "general", "text": "hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allows remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7295", "url": "https://www.suse.com/security/cve/CVE-2015-7295" }, { "category": "external", "summary": "SUSE Bug 947159 for CVE-2015-7295", "url": "https://bugzilla.suse.com/947159" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2015-7295", "url": "https://bugzilla.suse.com/950367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "moderate" } ], "title": "CVE-2015-7295" }, { "cve": "CVE-2015-7549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7549" } ], "notes": [ { "category": "general", "text": "The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7549", "url": "https://www.suse.com/security/cve/CVE-2015-7549" }, { "category": "external", "summary": "SUSE Bug 958917 for CVE-2015-7549", "url": "https://bugzilla.suse.com/958917" }, { "category": "external", "summary": "SUSE Bug 958918 for CVE-2015-7549", "url": "https://bugzilla.suse.com/958918" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "low" } ], "title": "CVE-2015-7549" }, { "cve": "CVE-2015-8504", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8504" } ], "notes": [ { "category": "general", "text": "Qemu, when built with VNC display driver support, allows remote attackers to cause a denial of service (arithmetic exception and application crash) via crafted SetPixelFormat messages from a client.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8504", "url": "https://www.suse.com/security/cve/CVE-2015-8504" }, { "category": "external", "summary": "SUSE Bug 958491 for CVE-2015-8504", "url": "https://bugzilla.suse.com/958491" }, { "category": "external", "summary": "SUSE Bug 958493 for CVE-2015-8504", "url": "https://bugzilla.suse.com/958493" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "moderate" } ], "title": "CVE-2015-8504" }, { "cve": "CVE-2015-8558", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8558" } ], "notes": [ { "category": "general", "text": "The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8558", "url": "https://www.suse.com/security/cve/CVE-2015-8558" }, { "category": "external", "summary": "SUSE Bug 959005 for CVE-2015-8558", "url": "https://bugzilla.suse.com/959005" }, { "category": "external", "summary": "SUSE Bug 959006 for CVE-2015-8558", "url": "https://bugzilla.suse.com/959006" }, { "category": "external", "summary": "SUSE Bug 976109 for CVE-2015-8558", "url": "https://bugzilla.suse.com/976109" }, { "category": "external", "summary": "SUSE Bug 976111 for CVE-2015-8558", "url": "https://bugzilla.suse.com/976111" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "moderate" } ], "title": "CVE-2015-8558" }, { "cve": "CVE-2015-8567", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8567" } ], "notes": [ { "category": "general", "text": "Memory leak in net/vmxnet3.c in QEMU allows remote attackers to cause a denial of service (memory consumption).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8567", "url": "https://www.suse.com/security/cve/CVE-2015-8567" }, { "category": "external", "summary": "SUSE Bug 959386 for CVE-2015-8567", "url": "https://bugzilla.suse.com/959386" }, { "category": "external", "summary": "SUSE Bug 959387 for CVE-2015-8567", "url": "https://bugzilla.suse.com/959387" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "low" } ], "title": "CVE-2015-8567" }, { "cve": "CVE-2015-8568", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8568" } ], "notes": [ { "category": "general", "text": "Memory leak in QEMU, when built with a VMWARE VMXNET3 paravirtual NIC emulator support, allows local guest users to cause a denial of service (host memory consumption) by trying to activate the vmxnet3 device repeatedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8568", "url": "https://www.suse.com/security/cve/CVE-2015-8568" }, { "category": "external", "summary": "SUSE Bug 959386 for CVE-2015-8568", "url": "https://bugzilla.suse.com/959386" }, { "category": "external", "summary": "SUSE Bug 959387 for CVE-2015-8568", "url": "https://bugzilla.suse.com/959387" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "low" } ], "title": "CVE-2015-8568" }, { "cve": "CVE-2015-8613", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8613" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest users to cause a denial of service (QEMU instance crash) via a crafted SCSI controller CTRL_GET_INFO command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8613", "url": "https://www.suse.com/security/cve/CVE-2015-8613" }, { "category": "external", "summary": "SUSE Bug 961358 for CVE-2015-8613", "url": "https://bugzilla.suse.com/961358" }, { "category": "external", "summary": "SUSE Bug 961556 for CVE-2015-8613", "url": "https://bugzilla.suse.com/961556" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "moderate" } ], "title": "CVE-2015-8613" }, { "cve": "CVE-2015-8619", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8619" } ], "notes": [ { "category": "general", "text": "The Human Monitor Interface support in QEMU allows remote attackers to cause a denial of service (out-of-bounds write and application crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8619", "url": "https://www.suse.com/security/cve/CVE-2015-8619" }, { "category": "external", "summary": "SUSE Bug 960334 for CVE-2015-8619", "url": "https://bugzilla.suse.com/960334" }, { "category": "external", "summary": "SUSE Bug 965269 for CVE-2015-8619", "url": "https://bugzilla.suse.com/965269" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "important" } ], "title": "CVE-2015-8619" }, { "cve": "CVE-2015-8743", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8743" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing \u0027ioport\u0027 r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8743", "url": "https://www.suse.com/security/cve/CVE-2015-8743" }, { "category": "external", "summary": "SUSE Bug 960725 for CVE-2015-8743", "url": "https://bugzilla.suse.com/960725" }, { "category": "external", "summary": "SUSE Bug 960726 for CVE-2015-8743", "url": "https://bugzilla.suse.com/960726" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "moderate" } ], "title": "CVE-2015-8743" }, { "cve": "CVE-2015-8744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8744" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8744", "url": "https://www.suse.com/security/cve/CVE-2015-8744" }, { "category": "external", "summary": "SUSE Bug 960835 for CVE-2015-8744", "url": "https://bugzilla.suse.com/960835" }, { "category": "external", "summary": "SUSE Bug 960836 for CVE-2015-8744", "url": "https://bugzilla.suse.com/960836" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "low" } ], "title": "CVE-2015-8744" }, { "cve": "CVE-2015-8745", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8745" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8745", "url": "https://www.suse.com/security/cve/CVE-2015-8745" }, { "category": "external", "summary": "SUSE Bug 960707 for CVE-2015-8745", "url": "https://bugzilla.suse.com/960707" }, { "category": "external", "summary": "SUSE Bug 960708 for CVE-2015-8745", "url": "https://bugzilla.suse.com/960708" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "low" } ], "title": "CVE-2015-8745" }, { "cve": "CVE-2015-8817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8817" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) built to use \u0027address_space_translate\u0027 to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions \u003e= 1.6.0 and \u003c= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8817", "url": "https://www.suse.com/security/cve/CVE-2015-8817" }, { "category": "external", "summary": "SUSE Bug 969121 for CVE-2015-8817", "url": "https://bugzilla.suse.com/969121" }, { "category": "external", "summary": "SUSE Bug 969122 for CVE-2015-8817", "url": "https://bugzilla.suse.com/969122" }, { "category": "external", "summary": "SUSE Bug 969125 for CVE-2015-8817", "url": "https://bugzilla.suse.com/969125" }, { "category": "external", "summary": "SUSE Bug 969126 for CVE-2015-8817", "url": "https://bugzilla.suse.com/969126" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "moderate" } ], "title": "CVE-2015-8817" }, { "cve": "CVE-2015-8818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8818" } ], "notes": [ { "category": "general", "text": "The cpu_physical_memory_write_rom_internal function in exec.c in QEMU (aka Quick Emulator) does not properly skip MMIO regions, which allows local privileged guest users to cause a denial of service (guest crash) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8818", "url": "https://www.suse.com/security/cve/CVE-2015-8818" }, { "category": "external", "summary": "SUSE Bug 969122 for CVE-2015-8818", "url": "https://bugzilla.suse.com/969122" }, { "category": "external", "summary": "SUSE Bug 969125 for CVE-2015-8818", "url": "https://bugzilla.suse.com/969125" }, { "category": "external", "summary": "SUSE Bug 969126 for CVE-2015-8818", "url": "https://bugzilla.suse.com/969126" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "moderate" } ], "title": "CVE-2015-8818" }, { "cve": "CVE-2016-1568", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1568" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1568", "url": "https://www.suse.com/security/cve/CVE-2016-1568" }, { "category": "external", "summary": "SUSE Bug 961332 for CVE-2016-1568", "url": "https://bugzilla.suse.com/961332" }, { "category": "external", "summary": "SUSE Bug 961333 for CVE-2016-1568", "url": "https://bugzilla.suse.com/961333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "moderate" } ], "title": "CVE-2016-1568" }, { "cve": "CVE-2016-1714", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1714" } ], "notes": [ { "category": "general", "text": "The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1714", "url": "https://www.suse.com/security/cve/CVE-2016-1714" }, { "category": "external", "summary": "SUSE Bug 961691 for CVE-2016-1714", "url": "https://bugzilla.suse.com/961691" }, { "category": "external", "summary": "SUSE Bug 961692 for CVE-2016-1714", "url": "https://bugzilla.suse.com/961692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "moderate" } ], "title": "CVE-2016-1714" }, { "cve": "CVE-2016-1922", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1922" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, \u0027current_cpu\u0027 remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1922", "url": "https://www.suse.com/security/cve/CVE-2016-1922" }, { "category": "external", "summary": "SUSE Bug 962320 for CVE-2016-1922", "url": "https://bugzilla.suse.com/962320" }, { "category": "external", "summary": "SUSE Bug 962321 for CVE-2016-1922", "url": "https://bugzilla.suse.com/962321" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "low" } ], "title": "CVE-2016-1922" }, { "cve": "CVE-2016-1981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1981" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1981", "url": "https://www.suse.com/security/cve/CVE-2016-1981" }, { "category": "external", "summary": "SUSE Bug 963782 for CVE-2016-1981", "url": "https://bugzilla.suse.com/963782" }, { "category": "external", "summary": "SUSE Bug 963783 for CVE-2016-1981", "url": "https://bugzilla.suse.com/963783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "low" } ], "title": "CVE-2016-1981" }, { "cve": "CVE-2016-2198", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2198" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) built with the USB EHCI emulation support is vulnerable to a null pointer dereference flaw. It could occur when an application attempts to write to EHCI capabilities registers. A privileged user inside quest could use this flaw to crash the QEMU process instance resulting in DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2198", "url": "https://www.suse.com/security/cve/CVE-2016-2198" }, { "category": "external", "summary": "SUSE Bug 964413 for CVE-2016-2198", "url": "https://bugzilla.suse.com/964413" }, { "category": "external", "summary": "SUSE Bug 964415 for CVE-2016-2198", "url": "https://bugzilla.suse.com/964415" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "low" } ], "title": "CVE-2016-2198" }, { "cve": "CVE-2016-2538", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2538" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 allow local guest OS administrators to cause a denial of service (QEMU process crash) or obtain sensitive host memory information via a remote NDIS control message packet that is mishandled in the (1) rndis_query_response, (2) rndis_set_response, or (3) usb_net_handle_dataout function.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2538", "url": "https://www.suse.com/security/cve/CVE-2016-2538" }, { "category": "external", "summary": "SUSE Bug 967969 for CVE-2016-2538", "url": "https://bugzilla.suse.com/967969" }, { "category": "external", "summary": "SUSE Bug 968004 for CVE-2016-2538", "url": "https://bugzilla.suse.com/968004" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "important" } ], "title": "CVE-2016-2538" }, { "cve": "CVE-2016-2841", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2841" } ], "notes": [ { "category": "general", "text": "The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) in QEMU before 2.5.1 allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2841", "url": "https://www.suse.com/security/cve/CVE-2016-2841" }, { "category": "external", "summary": "SUSE Bug 969350 for CVE-2016-2841", "url": "https://bugzilla.suse.com/969350" }, { "category": "external", "summary": "SUSE Bug 969351 for CVE-2016-2841", "url": "https://bugzilla.suse.com/969351" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "low" } ], "title": "CVE-2016-2841" }, { "cve": "CVE-2016-2857", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2857" } ], "notes": [ { "category": "general", "text": "The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2857", "url": "https://www.suse.com/security/cve/CVE-2016-2857" }, { "category": "external", "summary": "SUSE Bug 970037 for CVE-2016-2857", "url": "https://bugzilla.suse.com/970037" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "low" } ], "title": "CVE-2016-2857" }, { "cve": "CVE-2016-2858", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2858" } ], "notes": [ { "category": "general", "text": "QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2858", "url": "https://www.suse.com/security/cve/CVE-2016-2858" }, { "category": "external", "summary": "SUSE Bug 970036 for CVE-2016-2858", "url": "https://bugzilla.suse.com/970036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "low" } ], "title": "CVE-2016-2858" }, { "cve": "CVE-2016-3710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3710" } ], "notes": [ { "category": "general", "text": "The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \"Dark Portal\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3710", "url": "https://www.suse.com/security/cve/CVE-2016-3710" }, { "category": "external", "summary": "SUSE Bug 978158 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978158" }, { "category": "external", "summary": "SUSE Bug 978164 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978164" }, { "category": "external", "summary": "SUSE Bug 978167 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978167" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "moderate" } ], "title": "CVE-2016-3710" }, { "cve": "CVE-2016-3712", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3712" } ], "notes": [ { "category": "general", "text": "Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3712", "url": "https://www.suse.com/security/cve/CVE-2016-3712" }, { "category": "external", "summary": "SUSE Bug 978160 for CVE-2016-3712", "url": "https://bugzilla.suse.com/978160" }, { "category": "external", "summary": "SUSE Bug 978164 for CVE-2016-3712", "url": "https://bugzilla.suse.com/978164" }, { "category": "external", "summary": "SUSE Bug 978167 for CVE-2016-3712", "url": "https://bugzilla.suse.com/978167" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "low" } ], "title": "CVE-2016-3712" }, { "cve": "CVE-2016-4001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4001" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4001", "url": "https://www.suse.com/security/cve/CVE-2016-4001" }, { "category": "external", "summary": "SUSE Bug 975128 for CVE-2016-4001", "url": "https://bugzilla.suse.com/975128" }, { "category": "external", "summary": "SUSE Bug 975130 for CVE-2016-4001", "url": "https://bugzilla.suse.com/975130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "moderate" } ], "title": "CVE-2016-4001" }, { "cve": "CVE-2016-4002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4002" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4002", "url": "https://www.suse.com/security/cve/CVE-2016-4002" }, { "category": "external", "summary": "SUSE Bug 975136 for CVE-2016-4002", "url": "https://bugzilla.suse.com/975136" }, { "category": "external", "summary": "SUSE Bug 975138 for CVE-2016-4002", "url": "https://bugzilla.suse.com/975138" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "moderate" } ], "title": "CVE-2016-4002" }, { "cve": "CVE-2016-4020", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4020" } ], "notes": [ { "category": "general", "text": "The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4020", "url": "https://www.suse.com/security/cve/CVE-2016-4020" }, { "category": "external", "summary": "SUSE Bug 975700 for CVE-2016-4020", "url": "https://bugzilla.suse.com/975700" }, { "category": "external", "summary": "SUSE Bug 975907 for CVE-2016-4020", "url": "https://bugzilla.suse.com/975907" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "low" } ], "title": "CVE-2016-4020" }, { "cve": "CVE-2016-4037", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4037" } ], "notes": [ { "category": "general", "text": "The ehci_advance_state function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list, a related issue to CVE-2015-8558.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4037", "url": "https://www.suse.com/security/cve/CVE-2016-4037" }, { "category": "external", "summary": "SUSE Bug 959005 for CVE-2016-4037", "url": "https://bugzilla.suse.com/959005" }, { "category": "external", "summary": "SUSE Bug 959006 for CVE-2016-4037", "url": "https://bugzilla.suse.com/959006" }, { "category": "external", "summary": "SUSE Bug 976109 for CVE-2016-4037", "url": "https://bugzilla.suse.com/976109" }, { "category": "external", "summary": "SUSE Bug 976111 for CVE-2016-4037", "url": "https://bugzilla.suse.com/976111" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "low" } ], "title": "CVE-2016-4037" }, { "cve": "CVE-2016-4439", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4439" } ], "notes": [ { "category": "general", "text": "The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4439", "url": "https://www.suse.com/security/cve/CVE-2016-4439" }, { "category": "external", "summary": "SUSE Bug 980711 for CVE-2016-4439", "url": "https://bugzilla.suse.com/980711" }, { "category": "external", "summary": "SUSE Bug 980716 for CVE-2016-4439", "url": "https://bugzilla.suse.com/980716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "low" } ], "title": "CVE-2016-4439" }, { "cve": "CVE-2016-4441", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4441" } ], "notes": [ { "category": "general", "text": "The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4441", "url": "https://www.suse.com/security/cve/CVE-2016-4441" }, { "category": "external", "summary": "SUSE Bug 980723 for CVE-2016-4441", "url": "https://bugzilla.suse.com/980723" }, { "category": "external", "summary": "SUSE Bug 980724 for CVE-2016-4441", "url": "https://bugzilla.suse.com/980724" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "low" } ], "title": "CVE-2016-4441" }, { "cve": "CVE-2016-4952", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4952" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator), when built with VMWARE PVSCSI paravirtual SCSI bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds array access) via vectors related to the (1) PVSCSI_CMD_SETUP_RINGS or (2) PVSCSI_CMD_SETUP_MSG_RING SCSI command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4952", "url": "https://www.suse.com/security/cve/CVE-2016-4952" }, { "category": "external", "summary": "SUSE Bug 981266 for CVE-2016-4952", "url": "https://bugzilla.suse.com/981266" }, { "category": "external", "summary": "SUSE Bug 981276 for CVE-2016-4952", "url": "https://bugzilla.suse.com/981276" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Desktop 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Desktop 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server 12:qemu-x86-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ppc-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-s390-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-13T07:13:18Z", "details": "low" } ], "title": "CVE-2016-4952" } ] }
suse-su-2016:2533-1
Vulnerability from csaf_suse
Published
2016-10-13 15:12
Modified
2016-10-13 15:12
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes several issues.
These security issues were fixed:
- CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264).
- CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188).
- CVE-2016-3159: The fpu_fxrstor function in arch/x86/i387.c did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188).
- CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the 'Dark Portal' issue (bsc#978164)
- CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038).
- CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130).
- CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138).
- CVE-2016-4020: The patch_instruction function did not initialize the imm32 variable, which allowed local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR) (bsc#975907)
- CVE-2016-4037: The ehci_advance_state function in hw/usb/hcd-ehci.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list (bsc#976111)
- CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716)
- CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724)
- CVE-2016-4453: The vmsvga_fifo_run function allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982225)
- CVE-2016-4454: The vmsvga_fifo_read_raw function allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggered an out-of-bounds read (bsc#982224)
- CVE-2016-4480: The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen did not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might have allowed local guest OS users to gain privileges via a crafted mapping of memory (bsc#978295).
- CVE-2016-4952: Out-of-bounds access issue in pvsci_ring_init_msg/data routines (bsc#981276)
- CVE-2016-4962: The libxl device-handling allowed local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled areas of xenstore (bsc#979620)
- CVE-2016-4963: The libxl device-handling allowed local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore (bsc#979670)
- CVE-2016-5105: Stack information leakage while reading configuration (bsc#982024)
- CVE-2016-5106: Out-of-bounds write while setting controller properties (bsc#982025)
- CVE-2016-5107: Out-of-bounds read in megasas_lookup_frame() function (bsc#982026)
- CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982286)
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960)
- CVE-2016-5337: The megasas_ctrl_get_info function allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983973)
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the host via vectors related to the information transfer buffer (bsc#983984)
- CVE-2016-5403: virtio: unbounded memory allocation on host via guest leading to DoS (XSA-184) (bsc#990923)
- CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries (bsc#988675)
- CVE-2016-6351: The esp_do_dma function in hw/scsi/esp.c, when built with ESP/NCR53C9x controller emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the host via vectors involving DMA read into ESP command buffer (bsc#990843).
- CVE-2016-6833: A use-after-free issue in the VMWARE VMXNET3 NIC device support allowed privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#994775).
- CVE-2016-6834: A infinite loop during packet fragmentation in the VMWARE VMXNET3 NIC device support allowed privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#994421).
- CVE-2016-6835: Buffer overflow in the VMWARE VMXNET3 NIC device support, causing an OOB read access (bsc#994625).
- CVE-2016-6836: VMWARE VMXNET3 NIC device allowed privileged user inside the guest to leak information. It occured while processing transmit(tx) queue, when it reaches the end of packet (bsc#994761).
- CVE-2016-6888: A integer overflow int the VMWARE VMXNET3 NIC device support, during the initialisation of new packets in the device, could have allowed a privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#994772).
- CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785)
- CVE-2016-7093: Xen allowed local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation (bsc#995789)
- CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792)
- CVE-2016-7154: Use-after-free vulnerability in the FIFO event channel code in Xen allowed local guest OS administrators to cause a denial of service (host crash) and possibly execute arbitrary code or obtain sensitive information via an invalid guest frame number (bsc#997731).
These non-security issues were fixed:
- bsc#991934: Hypervisor crash in csched_acct
- bsc#992224: During boot of Xen Hypervisor, failed to get contiguous memory for DMA
- bsc#970135: New virtualization project clock test randomly fails on Xen
- bsc#971949: xl: Support (by ignoring) xl migrate --live. xl migrations are always live
- bsc#990970: Add PMU support for Intel E7-8867 v4 (fam=6, model=79)
- bsc#985503: vif-route broken
- bsc#978413: PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host.
- bsc#986586: Out of memory (oom) during boot on 'modprobe xenblk' (non xen kernel)
- bsc#953339, bsc#953362, bsc#953518, bsc#984981: Implement SUSE specific unplug protocol for emulated PCI devices in PVonHVM guests to qemu-xen-upstream
- bsc#958848: HVM guest crash at /usr/src/packages/BUILD/ xen-4.4.2-testing/obj/default/balloon/balloon.c:407
- bsc#982695: xen-4.5.2 qemu fails to boot HVM guest from xvda
- bsc#954872: script block-dmmd not working as expected
- bsc#961600: : poor performance when Xen HVM domU configured with max memory > current memory
- bsc#979035: Restore xm migrate fixes for bsc#955399/ bsc#955399
- bsc#963161: Windows VM getting stuck during load while a VF is assigned to it
- bsc#976058: Xen error running simple HVM guest (Post Alpha 2 xen+qemu)
- bsc#957986: Indirect descriptors are not compatible with Amazon block backend
- bsc#973631: AWS EC2 kdump issue
- bsc#964427: Discarding device blocks failed with input/output error
Patchnames
SUSE-SLE-SAP-12-2016-1476,SUSE-SLE-SERVER-12-2016-1476
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes several issues.\n\nThese security issues were fixed:\n- CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264).\n- CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188).\n- CVE-2016-3159: The fpu_fxrstor function in arch/x86/i387.c did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188).\n- CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \u0027Dark Portal\u0027 issue (bsc#978164)\n- CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038).\n- CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130).\n- CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138).\n- CVE-2016-4020: The patch_instruction function did not initialize the imm32 variable, which allowed local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR) (bsc#975907)\n- CVE-2016-4037: The ehci_advance_state function in hw/usb/hcd-ehci.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list (bsc#976111)\n- CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716)\n- CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724)\n- CVE-2016-4453: The vmsvga_fifo_run function allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982225)\n- CVE-2016-4454: The vmsvga_fifo_read_raw function allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggered an out-of-bounds read (bsc#982224)\n- CVE-2016-4480: The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen did not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might have allowed local guest OS users to gain privileges via a crafted mapping of memory (bsc#978295).\n- CVE-2016-4952: Out-of-bounds access issue in pvsci_ring_init_msg/data routines (bsc#981276)\n- CVE-2016-4962: The libxl device-handling allowed local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled areas of xenstore (bsc#979620)\n- CVE-2016-4963: The libxl device-handling allowed local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore (bsc#979670)\n- CVE-2016-5105: Stack information leakage while reading configuration (bsc#982024)\n- CVE-2016-5106: Out-of-bounds write while setting controller properties (bsc#982025)\n- CVE-2016-5107: Out-of-bounds read in megasas_lookup_frame() function (bsc#982026)\n- CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982286)\n- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960)\n- CVE-2016-5337: The megasas_ctrl_get_info function allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983973)\n- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the host via vectors related to the information transfer buffer (bsc#983984)\n- CVE-2016-5403: virtio: unbounded memory allocation on host via guest leading to DoS (XSA-184) (bsc#990923)\n- CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries (bsc#988675)\n- CVE-2016-6351: The esp_do_dma function in hw/scsi/esp.c, when built with ESP/NCR53C9x controller emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the host via vectors involving DMA read into ESP command buffer (bsc#990843).\n- CVE-2016-6833: A use-after-free issue in the VMWARE VMXNET3 NIC device support allowed privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#994775).\n- CVE-2016-6834: A infinite loop during packet fragmentation in the VMWARE VMXNET3 NIC device support allowed privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#994421).\n- CVE-2016-6835: Buffer overflow in the VMWARE VMXNET3 NIC device support, causing an OOB read access (bsc#994625).\n- CVE-2016-6836: VMWARE VMXNET3 NIC device allowed privileged user inside the guest to leak information. It occured while processing transmit(tx) queue, when it reaches the end of packet (bsc#994761).\n- CVE-2016-6888: A integer overflow int the VMWARE VMXNET3 NIC device support, during the initialisation of new packets in the device, could have allowed a privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#994772).\n- CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785)\n- CVE-2016-7093: Xen allowed local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation (bsc#995789)\n- CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792)\n- CVE-2016-7154: Use-after-free vulnerability in the FIFO event channel code in Xen allowed local guest OS administrators to cause a denial of service (host crash) and possibly execute arbitrary code or obtain sensitive information via an invalid guest frame number (bsc#997731).\n\nThese non-security issues were fixed:\n- bsc#991934: Hypervisor crash in csched_acct\n- bsc#992224: During boot of Xen Hypervisor, failed to get contiguous memory for DMA\n- bsc#970135: New virtualization project clock test randomly fails on Xen \n- bsc#971949: xl: Support (by ignoring) xl migrate --live. xl migrations are always live\n- bsc#990970: Add PMU support for Intel E7-8867 v4 (fam=6, model=79)\n- bsc#985503: vif-route broken\n- bsc#978413: PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host.\n- bsc#986586: Out of memory (oom) during boot on \u0027modprobe xenblk\u0027 (non xen kernel)\n- bsc#953339, bsc#953362, bsc#953518, bsc#984981: Implement SUSE specific unplug protocol for emulated PCI devices in PVonHVM guests to qemu-xen-upstream\n- bsc#958848: HVM guest crash at /usr/src/packages/BUILD/ xen-4.4.2-testing/obj/default/balloon/balloon.c:407\n- bsc#982695: xen-4.5.2 qemu fails to boot HVM guest from xvda \n- bsc#954872: script block-dmmd not working as expected\n- bsc#961600: : poor performance when Xen HVM domU configured with max memory \u003e current memory\n- bsc#979035: Restore xm migrate fixes for bsc#955399/ bsc#955399\n- bsc#963161: Windows VM getting stuck during load while a VF is assigned to it\n- bsc#976058: Xen error running simple HVM guest (Post Alpha 2 xen+qemu)\n- bsc#957986: Indirect descriptors are not compatible with Amazon block backend\n- bsc#973631: AWS EC2 kdump issue\n- bsc#964427: Discarding device blocks failed with input/output error\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1476,SUSE-SLE-SERVER-12-2016-1476", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2533-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2533-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162533-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2533-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" }, { "category": "self", "summary": "SUSE Bug 953339", "url": "https://bugzilla.suse.com/953339" }, { "category": "self", "summary": "SUSE Bug 953362", "url": "https://bugzilla.suse.com/953362" }, { "category": "self", "summary": "SUSE Bug 953518", "url": "https://bugzilla.suse.com/953518" }, { "category": "self", "summary": "SUSE Bug 954872", "url": "https://bugzilla.suse.com/954872" }, { "category": "self", "summary": "SUSE Bug 955399", "url": "https://bugzilla.suse.com/955399" }, { "category": "self", "summary": "SUSE Bug 957986", "url": "https://bugzilla.suse.com/957986" }, { "category": "self", "summary": "SUSE Bug 958848", "url": "https://bugzilla.suse.com/958848" }, { "category": "self", "summary": "SUSE Bug 961600", "url": "https://bugzilla.suse.com/961600" }, { "category": "self", "summary": "SUSE Bug 963161", "url": "https://bugzilla.suse.com/963161" }, { "category": "self", "summary": "SUSE Bug 964427", "url": "https://bugzilla.suse.com/964427" }, { "category": "self", "summary": "SUSE Bug 970135", "url": "https://bugzilla.suse.com/970135" }, { "category": "self", "summary": "SUSE Bug 971949", "url": "https://bugzilla.suse.com/971949" }, { "category": "self", "summary": "SUSE Bug 973188", "url": "https://bugzilla.suse.com/973188" }, { "category": "self", "summary": "SUSE Bug 973631", "url": "https://bugzilla.suse.com/973631" }, { "category": "self", "summary": "SUSE Bug 974038", "url": "https://bugzilla.suse.com/974038" }, { "category": "self", "summary": "SUSE Bug 975130", "url": "https://bugzilla.suse.com/975130" }, { "category": "self", "summary": "SUSE Bug 975138", "url": "https://bugzilla.suse.com/975138" }, { "category": "self", "summary": "SUSE Bug 975907", "url": "https://bugzilla.suse.com/975907" }, { "category": "self", "summary": "SUSE Bug 976058", "url": "https://bugzilla.suse.com/976058" }, { "category": "self", "summary": "SUSE Bug 976111", "url": "https://bugzilla.suse.com/976111" }, { "category": "self", "summary": "SUSE Bug 978164", "url": "https://bugzilla.suse.com/978164" }, { "category": "self", "summary": "SUSE Bug 978295", "url": "https://bugzilla.suse.com/978295" }, { "category": "self", "summary": "SUSE Bug 978413", "url": "https://bugzilla.suse.com/978413" }, { "category": "self", "summary": "SUSE Bug 979035", "url": "https://bugzilla.suse.com/979035" }, { "category": "self", "summary": "SUSE Bug 979620", "url": "https://bugzilla.suse.com/979620" }, { "category": "self", "summary": "SUSE Bug 979670", "url": "https://bugzilla.suse.com/979670" }, { "category": "self", "summary": "SUSE Bug 980716", "url": "https://bugzilla.suse.com/980716" }, { "category": "self", "summary": "SUSE Bug 980724", "url": "https://bugzilla.suse.com/980724" }, { "category": "self", "summary": "SUSE Bug 981264", "url": "https://bugzilla.suse.com/981264" }, { "category": "self", "summary": "SUSE Bug 981276", "url": "https://bugzilla.suse.com/981276" }, { "category": "self", "summary": "SUSE Bug 982024", "url": "https://bugzilla.suse.com/982024" }, { "category": "self", "summary": "SUSE Bug 982025", "url": "https://bugzilla.suse.com/982025" }, { "category": "self", "summary": "SUSE Bug 982026", "url": "https://bugzilla.suse.com/982026" }, { "category": "self", "summary": "SUSE Bug 982224", "url": "https://bugzilla.suse.com/982224" }, { "category": "self", "summary": "SUSE Bug 982225", "url": "https://bugzilla.suse.com/982225" }, { "category": "self", "summary": "SUSE Bug 982286", "url": "https://bugzilla.suse.com/982286" }, { "category": "self", "summary": "SUSE Bug 982695", "url": "https://bugzilla.suse.com/982695" }, { "category": "self", "summary": "SUSE Bug 982960", "url": "https://bugzilla.suse.com/982960" }, { "category": "self", "summary": "SUSE Bug 983973", "url": "https://bugzilla.suse.com/983973" }, { "category": "self", "summary": "SUSE Bug 983984", "url": "https://bugzilla.suse.com/983984" }, { "category": "self", "summary": "SUSE Bug 984981", "url": "https://bugzilla.suse.com/984981" }, { "category": "self", "summary": "SUSE Bug 985503", "url": "https://bugzilla.suse.com/985503" }, { "category": "self", "summary": "SUSE Bug 986586", "url": "https://bugzilla.suse.com/986586" }, { "category": "self", "summary": "SUSE Bug 988675", "url": "https://bugzilla.suse.com/988675" }, { "category": "self", "summary": "SUSE Bug 990843", "url": "https://bugzilla.suse.com/990843" }, { "category": "self", "summary": "SUSE Bug 990923", "url": "https://bugzilla.suse.com/990923" }, { "category": "self", "summary": "SUSE Bug 990970", "url": "https://bugzilla.suse.com/990970" }, { "category": "self", "summary": "SUSE Bug 991934", "url": "https://bugzilla.suse.com/991934" }, { "category": "self", "summary": "SUSE Bug 992224", "url": "https://bugzilla.suse.com/992224" }, { "category": "self", "summary": "SUSE Bug 994421", "url": "https://bugzilla.suse.com/994421" }, { "category": "self", "summary": "SUSE Bug 994625", "url": "https://bugzilla.suse.com/994625" }, { "category": "self", "summary": "SUSE Bug 994761", "url": "https://bugzilla.suse.com/994761" }, { "category": "self", "summary": "SUSE Bug 994772", "url": "https://bugzilla.suse.com/994772" }, { "category": "self", "summary": "SUSE Bug 994775", "url": "https://bugzilla.suse.com/994775" }, { "category": "self", "summary": "SUSE Bug 995785", "url": "https://bugzilla.suse.com/995785" }, { "category": "self", "summary": "SUSE Bug 995789", "url": "https://bugzilla.suse.com/995789" }, { "category": "self", "summary": "SUSE Bug 995792", "url": "https://bugzilla.suse.com/995792" }, { "category": "self", "summary": "SUSE Bug 997731", "url": "https://bugzilla.suse.com/997731" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3615 page", "url": "https://www.suse.com/security/cve/CVE-2014-3615/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3672 page", "url": "https://www.suse.com/security/cve/CVE-2014-3672/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3158 page", "url": "https://www.suse.com/security/cve/CVE-2016-3158/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3159 page", "url": "https://www.suse.com/security/cve/CVE-2016-3159/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3710 page", "url": "https://www.suse.com/security/cve/CVE-2016-3710/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3712 page", "url": "https://www.suse.com/security/cve/CVE-2016-3712/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3960 page", "url": "https://www.suse.com/security/cve/CVE-2016-3960/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4001 page", "url": "https://www.suse.com/security/cve/CVE-2016-4001/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4002 page", "url": "https://www.suse.com/security/cve/CVE-2016-4002/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4020 page", "url": "https://www.suse.com/security/cve/CVE-2016-4020/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4037 page", "url": "https://www.suse.com/security/cve/CVE-2016-4037/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4439 page", "url": "https://www.suse.com/security/cve/CVE-2016-4439/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4441 page", "url": "https://www.suse.com/security/cve/CVE-2016-4441/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4453 page", "url": "https://www.suse.com/security/cve/CVE-2016-4453/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4454 page", "url": "https://www.suse.com/security/cve/CVE-2016-4454/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4480 page", "url": "https://www.suse.com/security/cve/CVE-2016-4480/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4952 page", "url": "https://www.suse.com/security/cve/CVE-2016-4952/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4962 page", "url": "https://www.suse.com/security/cve/CVE-2016-4962/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4963 page", "url": "https://www.suse.com/security/cve/CVE-2016-4963/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5105 page", "url": "https://www.suse.com/security/cve/CVE-2016-5105/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5106 page", "url": "https://www.suse.com/security/cve/CVE-2016-5106/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5107 page", "url": "https://www.suse.com/security/cve/CVE-2016-5107/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5126 page", "url": "https://www.suse.com/security/cve/CVE-2016-5126/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5238 page", "url": "https://www.suse.com/security/cve/CVE-2016-5238/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5337 page", "url": "https://www.suse.com/security/cve/CVE-2016-5337/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5338 page", "url": "https://www.suse.com/security/cve/CVE-2016-5338/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5403 page", "url": "https://www.suse.com/security/cve/CVE-2016-5403/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6258 page", "url": "https://www.suse.com/security/cve/CVE-2016-6258/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6351 page", "url": "https://www.suse.com/security/cve/CVE-2016-6351/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6833 page", "url": "https://www.suse.com/security/cve/CVE-2016-6833/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6834 page", "url": "https://www.suse.com/security/cve/CVE-2016-6834/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6835 page", "url": "https://www.suse.com/security/cve/CVE-2016-6835/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6836 page", "url": "https://www.suse.com/security/cve/CVE-2016-6836/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6888 page", "url": "https://www.suse.com/security/cve/CVE-2016-6888/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7092 page", "url": "https://www.suse.com/security/cve/CVE-2016-7092/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7093 page", "url": "https://www.suse.com/security/cve/CVE-2016-7093/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7094 page", "url": "https://www.suse.com/security/cve/CVE-2016-7094/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7154 page", "url": "https://www.suse.com/security/cve/CVE-2016-7154/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2016-10-13T15:12:40Z", "generator": { "date": "2016-10-13T15:12:40Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2533-1", "initial_release_date": "2016-10-13T15:12:40Z", "revision_history": [ { "date": "2016-10-13T15:12:40Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.4.4_04-22.22.2.x86_64", "product": { "name": "xen-4.4.4_04-22.22.2.x86_64", "product_id": "xen-4.4.4_04-22.22.2.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.4.4_04-22.22.2.x86_64", "product": { "name": "xen-doc-html-4.4.4_04-22.22.2.x86_64", "product_id": "xen-doc-html-4.4.4_04-22.22.2.x86_64" } }, { "category": "product_version", "name": "xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "product": { "name": "xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "product_id": "xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.4.4_04-22.22.2.x86_64", "product": { "name": "xen-libs-4.4.4_04-22.22.2.x86_64", "product_id": "xen-libs-4.4.4_04-22.22.2.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "product": { "name": "xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "product_id": "xen-libs-32bit-4.4.4_04-22.22.2.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.4.4_04-22.22.2.x86_64", "product": { "name": "xen-tools-4.4.4_04-22.22.2.x86_64", "product_id": "xen-tools-4.4.4_04-22.22.2.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.4.4_04-22.22.2.x86_64", "product": { "name": "xen-tools-domU-4.4.4_04-22.22.2.x86_64", "product_id": "xen-tools-domU-4.4.4_04-22.22.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.4.4_04-22.22.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64" }, "product_reference": "xen-4.4.4_04-22.22.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.4.4_04-22.22.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64" }, "product_reference": "xen-doc-html-4.4.4_04-22.22.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64" }, "product_reference": "xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.4_04-22.22.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64" }, "product_reference": "xen-libs-4.4.4_04-22.22.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.4.4_04-22.22.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64" }, "product_reference": "xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.4.4_04-22.22.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64" }, "product_reference": "xen-tools-4.4.4_04-22.22.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.4.4_04-22.22.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" }, "product_reference": "xen-tools-domU-4.4.4_04-22.22.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.4.4_04-22.22.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64" }, "product_reference": "xen-4.4.4_04-22.22.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.4.4_04-22.22.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64" }, "product_reference": "xen-doc-html-4.4.4_04-22.22.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64" }, "product_reference": "xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.4_04-22.22.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64" }, "product_reference": "xen-libs-4.4.4_04-22.22.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.4.4_04-22.22.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64" }, "product_reference": "xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.4.4_04-22.22.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64" }, "product_reference": "xen-tools-4.4.4_04-22.22.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.4.4_04-22.22.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64" }, "product_reference": "xen-tools-domU-4.4.4_04-22.22.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-3615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3615" } ], "notes": [ { "category": "general", "text": "The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3615", "url": "https://www.suse.com/security/cve/CVE-2014-3615" }, { "category": "external", "summary": "SUSE Bug 895528 for CVE-2014-3615", "url": "https://bugzilla.suse.com/895528" }, { "category": "external", "summary": "SUSE Bug 918998 for CVE-2014-3615", "url": "https://bugzilla.suse.com/918998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "moderate" } ], "title": "CVE-2014-3615" }, { "cve": "CVE-2014-3672", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3672" } ], "notes": [ { "category": "general", "text": "The qemu implementation in libvirt before 1.3.0 and Xen allows local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3672", "url": "https://www.suse.com/security/cve/CVE-2014-3672" }, { "category": "external", "summary": "SUSE Bug 981264 for CVE-2014-3672", "url": "https://bugzilla.suse.com/981264" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "low" } ], "title": "CVE-2014-3672" }, { "cve": "CVE-2016-3158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3158" } ], "notes": [ { "category": "general", "text": "The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3158", "url": "https://www.suse.com/security/cve/CVE-2016-3158" }, { "category": "external", "summary": "SUSE Bug 973188 for CVE-2016-3158", "url": "https://bugzilla.suse.com/973188" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "low" } ], "title": "CVE-2016-3158" }, { "cve": "CVE-2016-3159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3159" } ], "notes": [ { "category": "general", "text": "The fpu_fxrstor function in arch/x86/i387.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3159", "url": "https://www.suse.com/security/cve/CVE-2016-3159" }, { "category": "external", "summary": "SUSE Bug 973188 for CVE-2016-3159", "url": "https://bugzilla.suse.com/973188" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "low" } ], "title": "CVE-2016-3159" }, { "cve": "CVE-2016-3710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3710" } ], "notes": [ { "category": "general", "text": "The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \"Dark Portal\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3710", "url": "https://www.suse.com/security/cve/CVE-2016-3710" }, { "category": "external", "summary": "SUSE Bug 978158 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978158" }, { "category": "external", "summary": "SUSE Bug 978164 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978164" }, { "category": "external", "summary": "SUSE Bug 978167 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978167" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "moderate" } ], "title": "CVE-2016-3710" }, { "cve": "CVE-2016-3712", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3712" } ], "notes": [ { "category": "general", "text": "Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3712", "url": "https://www.suse.com/security/cve/CVE-2016-3712" }, { "category": "external", "summary": "SUSE Bug 978160 for CVE-2016-3712", "url": "https://bugzilla.suse.com/978160" }, { "category": "external", "summary": "SUSE Bug 978164 for CVE-2016-3712", "url": "https://bugzilla.suse.com/978164" }, { "category": "external", "summary": "SUSE Bug 978167 for CVE-2016-3712", "url": "https://bugzilla.suse.com/978167" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "low" } ], "title": "CVE-2016-3712" }, { "cve": "CVE-2016-3960", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3960" } ], "notes": [ { "category": "general", "text": "Integer overflow in the x86 shadow pagetable code in Xen allows local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3960", "url": "https://www.suse.com/security/cve/CVE-2016-3960" }, { "category": "external", "summary": "SUSE Bug 1072223 for CVE-2016-3960", "url": "https://bugzilla.suse.com/1072223" }, { "category": "external", "summary": "SUSE Bug 974038 for CVE-2016-3960", "url": "https://bugzilla.suse.com/974038" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "important" } ], "title": "CVE-2016-3960" }, { "cve": "CVE-2016-4001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4001" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4001", "url": "https://www.suse.com/security/cve/CVE-2016-4001" }, { "category": "external", "summary": "SUSE Bug 975128 for CVE-2016-4001", "url": "https://bugzilla.suse.com/975128" }, { "category": "external", "summary": "SUSE Bug 975130 for CVE-2016-4001", "url": "https://bugzilla.suse.com/975130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "moderate" } ], "title": "CVE-2016-4001" }, { "cve": "CVE-2016-4002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4002" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4002", "url": "https://www.suse.com/security/cve/CVE-2016-4002" }, { "category": "external", "summary": "SUSE Bug 975136 for CVE-2016-4002", "url": "https://bugzilla.suse.com/975136" }, { "category": "external", "summary": "SUSE Bug 975138 for CVE-2016-4002", "url": "https://bugzilla.suse.com/975138" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "moderate" } ], "title": "CVE-2016-4002" }, { "cve": "CVE-2016-4020", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4020" } ], "notes": [ { "category": "general", "text": "The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4020", "url": "https://www.suse.com/security/cve/CVE-2016-4020" }, { "category": "external", "summary": "SUSE Bug 975700 for CVE-2016-4020", "url": "https://bugzilla.suse.com/975700" }, { "category": "external", "summary": "SUSE Bug 975907 for CVE-2016-4020", "url": "https://bugzilla.suse.com/975907" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "low" } ], "title": "CVE-2016-4020" }, { "cve": "CVE-2016-4037", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4037" } ], "notes": [ { "category": "general", "text": "The ehci_advance_state function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list, a related issue to CVE-2015-8558.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4037", "url": "https://www.suse.com/security/cve/CVE-2016-4037" }, { "category": "external", "summary": "SUSE Bug 959005 for CVE-2016-4037", "url": "https://bugzilla.suse.com/959005" }, { "category": "external", "summary": "SUSE Bug 959006 for CVE-2016-4037", "url": "https://bugzilla.suse.com/959006" }, { "category": "external", "summary": "SUSE Bug 976109 for CVE-2016-4037", "url": "https://bugzilla.suse.com/976109" }, { "category": "external", "summary": "SUSE Bug 976111 for CVE-2016-4037", "url": "https://bugzilla.suse.com/976111" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "low" } ], "title": "CVE-2016-4037" }, { "cve": "CVE-2016-4439", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4439" } ], "notes": [ { "category": "general", "text": "The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4439", "url": "https://www.suse.com/security/cve/CVE-2016-4439" }, { "category": "external", "summary": "SUSE Bug 980711 for CVE-2016-4439", "url": "https://bugzilla.suse.com/980711" }, { "category": "external", "summary": "SUSE Bug 980716 for CVE-2016-4439", "url": "https://bugzilla.suse.com/980716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "low" } ], "title": "CVE-2016-4439" }, { "cve": "CVE-2016-4441", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4441" } ], "notes": [ { "category": "general", "text": "The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4441", "url": "https://www.suse.com/security/cve/CVE-2016-4441" }, { "category": "external", "summary": "SUSE Bug 980723 for CVE-2016-4441", "url": "https://bugzilla.suse.com/980723" }, { "category": "external", "summary": "SUSE Bug 980724 for CVE-2016-4441", "url": "https://bugzilla.suse.com/980724" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "low" } ], "title": "CVE-2016-4441" }, { "cve": "CVE-2016-4453", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4453" } ], "notes": [ { "category": "general", "text": "The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4453", "url": "https://www.suse.com/security/cve/CVE-2016-4453" }, { "category": "external", "summary": "SUSE Bug 982223 for CVE-2016-4453", "url": "https://bugzilla.suse.com/982223" }, { "category": "external", "summary": "SUSE Bug 982225 for CVE-2016-4453", "url": "https://bugzilla.suse.com/982225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "low" } ], "title": "CVE-2016-4453" }, { "cve": "CVE-2016-4454", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4454" } ], "notes": [ { "category": "general", "text": "The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4454", "url": "https://www.suse.com/security/cve/CVE-2016-4454" }, { "category": "external", "summary": "SUSE Bug 982222 for CVE-2016-4454", "url": "https://bugzilla.suse.com/982222" }, { "category": "external", "summary": "SUSE Bug 982224 for CVE-2016-4454", "url": "https://bugzilla.suse.com/982224" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "low" } ], "title": "CVE-2016-4454" }, { "cve": "CVE-2016-4480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4480" } ], "notes": [ { "category": "general", "text": "The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4480", "url": "https://www.suse.com/security/cve/CVE-2016-4480" }, { "category": "external", "summary": "SUSE Bug 1072198 for CVE-2016-4480", "url": "https://bugzilla.suse.com/1072198" }, { "category": "external", "summary": "SUSE Bug 1072223 for CVE-2016-4480", "url": "https://bugzilla.suse.com/1072223" }, { "category": "external", "summary": "SUSE Bug 978288 for CVE-2016-4480", "url": "https://bugzilla.suse.com/978288" }, { "category": "external", "summary": "SUSE Bug 978295 for CVE-2016-4480", "url": "https://bugzilla.suse.com/978295" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "important" } ], "title": "CVE-2016-4480" }, { "cve": "CVE-2016-4952", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4952" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator), when built with VMWARE PVSCSI paravirtual SCSI bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds array access) via vectors related to the (1) PVSCSI_CMD_SETUP_RINGS or (2) PVSCSI_CMD_SETUP_MSG_RING SCSI command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4952", "url": "https://www.suse.com/security/cve/CVE-2016-4952" }, { "category": "external", "summary": "SUSE Bug 981266 for CVE-2016-4952", "url": "https://bugzilla.suse.com/981266" }, { "category": "external", "summary": "SUSE Bug 981276 for CVE-2016-4952", "url": "https://bugzilla.suse.com/981276" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "low" } ], "title": "CVE-2016-4952" }, { "cve": "CVE-2016-4962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4962" } ], "notes": [ { "category": "general", "text": "The libxl device-handling in Xen 4.6.x and earlier allows local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled areas of xenstore.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4962", "url": "https://www.suse.com/security/cve/CVE-2016-4962" }, { "category": "external", "summary": "SUSE Bug 979620 for CVE-2016-4962", "url": "https://bugzilla.suse.com/979620" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "moderate" } ], "title": "CVE-2016-4962" }, { "cve": "CVE-2016-4963", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4963" } ], "notes": [ { "category": "general", "text": "The libxl device-handling in Xen through 4.6.x allows local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4963", "url": "https://www.suse.com/security/cve/CVE-2016-4963" }, { "category": "external", "summary": "SUSE Bug 979641 for CVE-2016-4963", "url": "https://bugzilla.suse.com/979641" }, { "category": "external", "summary": "SUSE Bug 979670 for CVE-2016-4963", "url": "https://bugzilla.suse.com/979670" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "low" } ], "title": "CVE-2016-4963" }, { "cve": "CVE-2016-5105", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5105" } ], "notes": [ { "category": "general", "text": "The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, uses an uninitialized variable, which allows local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5105", "url": "https://www.suse.com/security/cve/CVE-2016-5105" }, { "category": "external", "summary": "SUSE Bug 982017 for CVE-2016-5105", "url": "https://bugzilla.suse.com/982017" }, { "category": "external", "summary": "SUSE Bug 982024 for CVE-2016-5105", "url": "https://bugzilla.suse.com/982024" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "low" } ], "title": "CVE-2016-5105" }, { "cve": "CVE-2016-5106", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5106" } ], "notes": [ { "category": "general", "text": "The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5106", "url": "https://www.suse.com/security/cve/CVE-2016-5106" }, { "category": "external", "summary": "SUSE Bug 982018 for CVE-2016-5106", "url": "https://bugzilla.suse.com/982018" }, { "category": "external", "summary": "SUSE Bug 982025 for CVE-2016-5106", "url": "https://bugzilla.suse.com/982025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "low" } ], "title": "CVE-2016-5106" }, { "cve": "CVE-2016-5107", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5107" } ], "notes": [ { "category": "general", "text": "The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5107", "url": "https://www.suse.com/security/cve/CVE-2016-5107" }, { "category": "external", "summary": "SUSE Bug 982019 for CVE-2016-5107", "url": "https://bugzilla.suse.com/982019" }, { "category": "external", "summary": "SUSE Bug 982026 for CVE-2016-5107", "url": "https://bugzilla.suse.com/982026" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "low" } ], "title": "CVE-2016-5107" }, { "cve": "CVE-2016-5126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5126" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5126", "url": "https://www.suse.com/security/cve/CVE-2016-5126" }, { "category": "external", "summary": "SUSE Bug 982285 for CVE-2016-5126", "url": "https://bugzilla.suse.com/982285" }, { "category": "external", "summary": "SUSE Bug 982286 for CVE-2016-5126", "url": "https://bugzilla.suse.com/982286" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "low" } ], "title": "CVE-2016-5126" }, { "cve": "CVE-2016-5238", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5238" } ], "notes": [ { "category": "general", "text": "The get_cmd function in hw/scsi/esp.c in QEMU might allow local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5238", "url": "https://www.suse.com/security/cve/CVE-2016-5238" }, { "category": "external", "summary": "SUSE Bug 982959 for CVE-2016-5238", "url": "https://bugzilla.suse.com/982959" }, { "category": "external", "summary": "SUSE Bug 982960 for CVE-2016-5238", "url": "https://bugzilla.suse.com/982960" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "moderate" } ], "title": "CVE-2016-5238" }, { "cve": "CVE-2016-5337", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5337" } ], "notes": [ { "category": "general", "text": "The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5337", "url": "https://www.suse.com/security/cve/CVE-2016-5337" }, { "category": "external", "summary": "SUSE Bug 983961 for CVE-2016-5337", "url": "https://bugzilla.suse.com/983961" }, { "category": "external", "summary": "SUSE Bug 983973 for CVE-2016-5337", "url": "https://bugzilla.suse.com/983973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "low" } ], "title": "CVE-2016-5337" }, { "cve": "CVE-2016-5338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5338" } ], "notes": [ { "category": "general", "text": "The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5338", "url": "https://www.suse.com/security/cve/CVE-2016-5338" }, { "category": "external", "summary": "SUSE Bug 983982 for CVE-2016-5338", "url": "https://bugzilla.suse.com/983982" }, { "category": "external", "summary": "SUSE Bug 983984 for CVE-2016-5338", "url": "https://bugzilla.suse.com/983984" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "low" } ], "title": "CVE-2016-5338" }, { "cve": "CVE-2016-5403", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5403" } ], "notes": [ { "category": "general", "text": "The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5403", "url": "https://www.suse.com/security/cve/CVE-2016-5403" }, { "category": "external", "summary": "SUSE Bug 990923 for CVE-2016-5403", "url": "https://bugzilla.suse.com/990923" }, { "category": "external", "summary": "SUSE Bug 991080 for CVE-2016-5403", "url": "https://bugzilla.suse.com/991080" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "low" } ], "title": "CVE-2016-5403" }, { "cve": "CVE-2016-6258", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6258" } ], "notes": [ { "category": "general", "text": "The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6258", "url": "https://www.suse.com/security/cve/CVE-2016-6258" }, { "category": "external", "summary": "SUSE Bug 1072198 for CVE-2016-6258", "url": "https://bugzilla.suse.com/1072198" }, { "category": "external", "summary": "SUSE Bug 1072223 for CVE-2016-6258", "url": "https://bugzilla.suse.com/1072223" }, { "category": "external", "summary": "SUSE Bug 988675 for CVE-2016-6258", "url": "https://bugzilla.suse.com/988675" }, { "category": "external", "summary": "SUSE Bug 988692 for CVE-2016-6258", "url": "https://bugzilla.suse.com/988692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "important" } ], "title": "CVE-2016-6258" }, { "cve": "CVE-2016-6351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6351" } ], "notes": [ { "category": "general", "text": "The esp_do_dma function in hw/scsi/esp.c in QEMU (aka Quick Emulator), when built with ESP/NCR53C9x controller emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the QEMU host via vectors involving DMA read into ESP command buffer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6351", "url": "https://www.suse.com/security/cve/CVE-2016-6351" }, { "category": "external", "summary": "SUSE Bug 990835 for CVE-2016-6351", "url": "https://bugzilla.suse.com/990835" }, { "category": "external", "summary": "SUSE Bug 990843 for CVE-2016-6351", "url": "https://bugzilla.suse.com/990843" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "low" } ], "title": "CVE-2016-6351" }, { "cve": "CVE-2016-6833", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6833" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU instance crash) by leveraging failure to check if the device is active.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6833", "url": "https://www.suse.com/security/cve/CVE-2016-6833" }, { "category": "external", "summary": "SUSE Bug 994774 for CVE-2016-6833", "url": "https://bugzilla.suse.com/994774" }, { "category": "external", "summary": "SUSE Bug 994775 for CVE-2016-6833", "url": "https://bugzilla.suse.com/994775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "moderate" } ], "title": "CVE-2016-6833" }, { "cve": "CVE-2016-6834", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6834" } ], "notes": [ { "category": "general", "text": "The net_tx_pkt_do_sw_fragmentation function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the current fragment length.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6834", "url": "https://www.suse.com/security/cve/CVE-2016-6834" }, { "category": "external", "summary": "SUSE Bug 994418 for CVE-2016-6834", "url": "https://bugzilla.suse.com/994418" }, { "category": "external", "summary": "SUSE Bug 994421 for CVE-2016-6834", "url": "https://bugzilla.suse.com/994421" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "low" } ], "title": "CVE-2016-6834" }, { "cve": "CVE-2016-6835", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6835" } ], "notes": [ { "category": "general", "text": "The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6835", "url": "https://www.suse.com/security/cve/CVE-2016-6835" }, { "category": "external", "summary": "SUSE Bug 994605 for CVE-2016-6835", "url": "https://bugzilla.suse.com/994605" }, { "category": "external", "summary": "SUSE Bug 994625 for CVE-2016-6835", "url": "https://bugzilla.suse.com/994625" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "low" } ], "title": "CVE-2016-6835" }, { "cve": "CVE-2016-6836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6836" } ], "notes": [ { "category": "general", "text": "The vmxnet3_complete_packet function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host memory information by leveraging failure to initialize the txcq_descr object.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6836", "url": "https://www.suse.com/security/cve/CVE-2016-6836" }, { "category": "external", "summary": "SUSE Bug 994760 for CVE-2016-6836", "url": "https://bugzilla.suse.com/994760" }, { "category": "external", "summary": "SUSE Bug 994761 for CVE-2016-6836", "url": "https://bugzilla.suse.com/994761" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "low" } ], "title": "CVE-2016-6836" }, { "cve": "CVE-2016-6888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6888" } ], "notes": [ { "category": "general", "text": "Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6888", "url": "https://www.suse.com/security/cve/CVE-2016-6888" }, { "category": "external", "summary": "SUSE Bug 994771 for CVE-2016-6888", "url": "https://bugzilla.suse.com/994771" }, { "category": "external", "summary": "SUSE Bug 994772 for CVE-2016-6888", "url": "https://bugzilla.suse.com/994772" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "low" } ], "title": "CVE-2016-6888" }, { "cve": "CVE-2016-7092", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7092" } ], "notes": [ { "category": "general", "text": "The get_page_from_l3e function in arch/x86/mm.c in Xen allows local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7092", "url": "https://www.suse.com/security/cve/CVE-2016-7092" }, { "category": "external", "summary": "SUSE Bug 995785 for CVE-2016-7092", "url": "https://bugzilla.suse.com/995785" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "important" } ], "title": "CVE-2016-7092" }, { "cve": "CVE-2016-7093", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7093" } ], "notes": [ { "category": "general", "text": "Xen 4.5.3, 4.6.3, and 4.7.x allow local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7093", "url": "https://www.suse.com/security/cve/CVE-2016-7093" }, { "category": "external", "summary": "SUSE Bug 995789 for CVE-2016-7093", "url": "https://bugzilla.suse.com/995789" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "important" } ], "title": "CVE-2016-7093" }, { "cve": "CVE-2016-7094", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7094" } ], "notes": [ { "category": "general", "text": "Buffer overflow in Xen 4.7.x and earlier allows local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7094", "url": "https://www.suse.com/security/cve/CVE-2016-7094" }, { "category": "external", "summary": "SUSE Bug 995792 for CVE-2016-7094", "url": "https://bugzilla.suse.com/995792" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "moderate" } ], "title": "CVE-2016-7094" }, { "cve": "CVE-2016-7154", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7154" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the FIFO event channel code in Xen 4.4.x allows local guest OS administrators to cause a denial of service (host crash) and possibly execute arbitrary code or obtain sensitive information via an invalid guest frame number.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7154", "url": "https://www.suse.com/security/cve/CVE-2016-7154" }, { "category": "external", "summary": "SUSE Bug 997731 for CVE-2016-7154", "url": "https://bugzilla.suse.com/997731" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_04-22.22.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_04-22.22.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-13T15:12:40Z", "details": "moderate" } ], "title": "CVE-2016-7154" } ] }
suse-su-2016:2100-1
Vulnerability from csaf_suse
Published
2016-08-18 12:48
Modified
2016-08-18 12:48
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the several issues.
These security issues were fixed:
- CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264).
- CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188).
- CVE-2016-3159: The fpu_fxrstor function in arch/x86/i387.c did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188).
- CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the 'Dark Portal' issue (bsc#978164).
- CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038).
- CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130).
- CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138).
- CVE-2016-4020: The patch_instruction function did not initialize the imm32 variable, which allowed local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR) (bsc#975907).
- CVE-2016-4037: The ehci_advance_state function in hw/usb/hcd-ehci.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list (bsc#976111).
- CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716).
- CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724).
- CVE-2016-4453: The vmsvga_fifo_run function allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982225).
- CVE-2016-4454: The vmsvga_fifo_read_raw function allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggered an out-of-bounds read (bsc#982224).
- CVE-2016-4952: Out-of-bounds access issue in pvsci_ring_init_msg/data routines (bsc#981276).
- CVE-2016-4962: The libxl device-handling allowed local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled areas of xenstore (bsc#979620).
- CVE-2016-4963: The libxl device-handling allowed local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore (bsc#979670).
- CVE-2016-5105: Stack information leakage while reading configuration (bsc#982024).
- CVE-2016-5106: Out-of-bounds write while setting controller properties (bsc#982025).
- CVE-2016-5107: Out-of-bounds read in megasas_lookup_frame() function (bsc#982026).
- CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982286).
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960).
- CVE-2016-5337: The megasas_ctrl_get_info function allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983973).
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the host via vectors related to the information transfer buffer (bsc#983984).
- CVE-2016-6258: Potential privilege escalation in PV guests (XSA-182) (bsc#988675).
- bsc#978295: x86 software guest page walk PS bit handling flaw (XSA-176)
- CVE-2016-5403: virtio: unbounded memory allocation on host via guest leading to DoS (XSA-184) (bsc#990923)
- CVE-2016-6351: scsi: esp: OOB write access in esp_do_dma (bsc#990843)
These non-security issues were fixed:
- bsc#954872: Script block-dmmd not working as expected - libxl: error: libxl_dm.c
- bsc#957986: Indirect descriptors are not compatible with Amazon block backend
- bsc#958848: HVM guest crash at /usr/src/packages/BUILD/xen-4.4.2-testing/obj/default/balloon/balloon.c:407
- bsc#961600: Poor performance when Xen HVM domU configured with max memory greater than current memory
- bsc#963161: Windows VM getting stuck during load while a VF is assigned to it after upgrading to latest maintenance updates
- bsc#964427: Discarding device blocks: failed - Input/output error
- bsc#976058: Xen error running simple HVM guest (Post Alpha 2 xen+qemu)
- bsc#982695: qemu fails to boot HVM guest from xvda
- bsc#986586: Out of memory (oom) during boot on 'modprobe xenblk' (non xen kernel)
- bsc#967630: Discrepancy in reported memory size with correction XSA-153 for xend. Additional memory adjustment made.
- bsc#974912: Persistent performance drop after live-migration using xend tool stack
- bsc#979035: Restore xm migrate fixes for bsc#955399/ bsc#955399
- bsc#989235: xen dom0 xm create command only searched /etc/xen instead of /etc/xen/vm
- Live Migration SLES 11 SP3 to SP4 on AMD: 'xc: error: Couldn't set extended vcpu0 info'
- bsc#985503: Fixed vif-route
- bsc#978413: PV guest upgrade from SLES11 SP4 to SLES 12 SP2 alpha3 failed
Patchnames
sdksp4-xen-12702,slessp4-xen-12702
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the several issues.\n\nThese security issues were fixed:\n- CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264).\n- CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188).\n- CVE-2016-3159: The fpu_fxrstor function in arch/x86/i387.c did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188).\n- CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \u0027Dark Portal\u0027 issue (bsc#978164).\n- CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038).\n- CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130).\n- CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138).\n- CVE-2016-4020: The patch_instruction function did not initialize the imm32 variable, which allowed local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR) (bsc#975907).\n- CVE-2016-4037: The ehci_advance_state function in hw/usb/hcd-ehci.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list (bsc#976111).\n- CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716).\n- CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724).\n- CVE-2016-4453: The vmsvga_fifo_run function allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982225).\n- CVE-2016-4454: The vmsvga_fifo_read_raw function allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggered an out-of-bounds read (bsc#982224).\n- CVE-2016-4952: Out-of-bounds access issue in pvsci_ring_init_msg/data routines (bsc#981276).\n- CVE-2016-4962: The libxl device-handling allowed local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled areas of xenstore (bsc#979620).\n- CVE-2016-4963: The libxl device-handling allowed local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore (bsc#979670).\n- CVE-2016-5105: Stack information leakage while reading configuration (bsc#982024).\n- CVE-2016-5106: Out-of-bounds write while setting controller properties (bsc#982025).\n- CVE-2016-5107: Out-of-bounds read in megasas_lookup_frame() function (bsc#982026).\n- CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982286).\n- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960).\n- CVE-2016-5337: The megasas_ctrl_get_info function allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983973).\n- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the host via vectors related to the information transfer buffer (bsc#983984).\n- CVE-2016-6258: Potential privilege escalation in PV guests (XSA-182) (bsc#988675).\n- bsc#978295: x86 software guest page walk PS bit handling flaw (XSA-176)\n- CVE-2016-5403: virtio: unbounded memory allocation on host via guest leading to DoS (XSA-184) (bsc#990923)\n- CVE-2016-6351: scsi: esp: OOB write access in esp_do_dma (bsc#990843)\n\nThese non-security issues were fixed:\n- bsc#954872: Script block-dmmd not working as expected - libxl: error: libxl_dm.c\n- bsc#957986: Indirect descriptors are not compatible with Amazon block backend\n- bsc#958848: HVM guest crash at /usr/src/packages/BUILD/xen-4.4.2-testing/obj/default/balloon/balloon.c:407\n- bsc#961600: Poor performance when Xen HVM domU configured with max memory greater than current memory\n- bsc#963161: Windows VM getting stuck during load while a VF is assigned to it after upgrading to latest maintenance updates\n- bsc#964427: Discarding device blocks: failed - Input/output error\n- bsc#976058: Xen error running simple HVM guest (Post Alpha 2 xen+qemu)\n- bsc#982695: qemu fails to boot HVM guest from xvda\n- bsc#986586: Out of memory (oom) during boot on \u0027modprobe xenblk\u0027 (non xen kernel)\n- bsc#967630: Discrepancy in reported memory size with correction XSA-153 for xend. Additional memory adjustment made.\n- bsc#974912: Persistent performance drop after live-migration using xend tool stack\n- bsc#979035: Restore xm migrate fixes for bsc#955399/ bsc#955399\n- bsc#989235: xen dom0 xm create command only searched /etc/xen instead of /etc/xen/vm\n- Live Migration SLES 11 SP3 to SP4 on AMD: \u0027xc: error: Couldn\u0027t set extended vcpu0 info\u0027\n- bsc#985503: Fixed vif-route\n- bsc#978413: PV guest upgrade from SLES11 SP4 to SLES 12 SP2 alpha3 failed\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-xen-12702,slessp4-xen-12702", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2100-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2100-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162100-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2100-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002217.html" }, { "category": "self", "summary": "SUSE Bug 954872", "url": "https://bugzilla.suse.com/954872" }, { "category": "self", "summary": "SUSE Bug 955399", "url": "https://bugzilla.suse.com/955399" }, { "category": "self", "summary": "SUSE Bug 957986", "url": "https://bugzilla.suse.com/957986" }, { "category": "self", "summary": "SUSE Bug 958848", "url": "https://bugzilla.suse.com/958848" }, { "category": "self", "summary": "SUSE Bug 961600", "url": "https://bugzilla.suse.com/961600" }, { "category": "self", "summary": "SUSE Bug 963161", "url": "https://bugzilla.suse.com/963161" }, { "category": "self", "summary": "SUSE Bug 964427", "url": "https://bugzilla.suse.com/964427" }, { "category": "self", "summary": "SUSE Bug 967630", "url": "https://bugzilla.suse.com/967630" }, { "category": "self", "summary": "SUSE Bug 973188", "url": "https://bugzilla.suse.com/973188" }, { "category": "self", "summary": "SUSE Bug 974038", "url": "https://bugzilla.suse.com/974038" }, { "category": "self", "summary": "SUSE Bug 974912", "url": "https://bugzilla.suse.com/974912" }, { "category": "self", "summary": "SUSE Bug 975130", "url": "https://bugzilla.suse.com/975130" }, { "category": "self", "summary": "SUSE Bug 975138", "url": "https://bugzilla.suse.com/975138" }, { "category": "self", "summary": "SUSE Bug 975907", "url": "https://bugzilla.suse.com/975907" }, { "category": "self", "summary": "SUSE Bug 976058", "url": "https://bugzilla.suse.com/976058" }, { "category": "self", "summary": "SUSE Bug 976111", "url": "https://bugzilla.suse.com/976111" }, { "category": "self", "summary": "SUSE Bug 978164", "url": "https://bugzilla.suse.com/978164" }, { "category": "self", "summary": "SUSE Bug 978295", "url": "https://bugzilla.suse.com/978295" }, { "category": "self", "summary": "SUSE Bug 978413", "url": "https://bugzilla.suse.com/978413" }, { "category": "self", "summary": "SUSE Bug 979035", "url": "https://bugzilla.suse.com/979035" }, { "category": "self", "summary": "SUSE Bug 979620", "url": "https://bugzilla.suse.com/979620" }, { "category": "self", "summary": "SUSE Bug 979670", "url": "https://bugzilla.suse.com/979670" }, { "category": "self", "summary": "SUSE Bug 980716", "url": "https://bugzilla.suse.com/980716" }, { "category": "self", "summary": "SUSE Bug 980724", "url": "https://bugzilla.suse.com/980724" }, { "category": "self", "summary": "SUSE Bug 981264", "url": "https://bugzilla.suse.com/981264" }, { "category": "self", "summary": "SUSE Bug 981276", "url": "https://bugzilla.suse.com/981276" }, { "category": "self", "summary": "SUSE Bug 982024", "url": "https://bugzilla.suse.com/982024" }, { "category": "self", "summary": "SUSE Bug 982025", "url": "https://bugzilla.suse.com/982025" }, { "category": "self", "summary": "SUSE Bug 982026", "url": "https://bugzilla.suse.com/982026" }, { "category": "self", "summary": "SUSE Bug 982224", "url": "https://bugzilla.suse.com/982224" }, { "category": "self", "summary": "SUSE Bug 982225", "url": "https://bugzilla.suse.com/982225" }, { "category": "self", "summary": "SUSE Bug 982286", "url": "https://bugzilla.suse.com/982286" }, { "category": "self", "summary": "SUSE Bug 982695", "url": "https://bugzilla.suse.com/982695" }, { "category": "self", "summary": "SUSE Bug 982960", "url": "https://bugzilla.suse.com/982960" }, { "category": "self", "summary": "SUSE Bug 983973", "url": "https://bugzilla.suse.com/983973" }, { "category": "self", "summary": "SUSE Bug 983984", "url": "https://bugzilla.suse.com/983984" }, { "category": "self", "summary": "SUSE Bug 985503", "url": "https://bugzilla.suse.com/985503" }, { "category": "self", "summary": "SUSE Bug 986586", "url": "https://bugzilla.suse.com/986586" }, { "category": "self", "summary": "SUSE Bug 988675", "url": "https://bugzilla.suse.com/988675" }, { "category": "self", "summary": "SUSE Bug 989235", "url": "https://bugzilla.suse.com/989235" }, { "category": "self", "summary": "SUSE Bug 990843", "url": "https://bugzilla.suse.com/990843" }, { "category": "self", "summary": "SUSE Bug 990923", "url": "https://bugzilla.suse.com/990923" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3672 page", "url": "https://www.suse.com/security/cve/CVE-2014-3672/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3158 page", "url": "https://www.suse.com/security/cve/CVE-2016-3158/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3159 page", "url": "https://www.suse.com/security/cve/CVE-2016-3159/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3710 page", "url": "https://www.suse.com/security/cve/CVE-2016-3710/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3960 page", "url": "https://www.suse.com/security/cve/CVE-2016-3960/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4001 page", "url": "https://www.suse.com/security/cve/CVE-2016-4001/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4002 page", "url": "https://www.suse.com/security/cve/CVE-2016-4002/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4020 page", "url": "https://www.suse.com/security/cve/CVE-2016-4020/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4037 page", "url": "https://www.suse.com/security/cve/CVE-2016-4037/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4439 page", "url": "https://www.suse.com/security/cve/CVE-2016-4439/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4441 page", "url": "https://www.suse.com/security/cve/CVE-2016-4441/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4453 page", "url": "https://www.suse.com/security/cve/CVE-2016-4453/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4454 page", "url": "https://www.suse.com/security/cve/CVE-2016-4454/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4952 page", "url": "https://www.suse.com/security/cve/CVE-2016-4952/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4962 page", "url": "https://www.suse.com/security/cve/CVE-2016-4962/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4963 page", "url": "https://www.suse.com/security/cve/CVE-2016-4963/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5105 page", "url": "https://www.suse.com/security/cve/CVE-2016-5105/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5106 page", "url": "https://www.suse.com/security/cve/CVE-2016-5106/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5107 page", "url": "https://www.suse.com/security/cve/CVE-2016-5107/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5126 page", "url": "https://www.suse.com/security/cve/CVE-2016-5126/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5238 page", "url": "https://www.suse.com/security/cve/CVE-2016-5238/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5337 page", "url": "https://www.suse.com/security/cve/CVE-2016-5337/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5338 page", "url": "https://www.suse.com/security/cve/CVE-2016-5338/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5403 page", "url": "https://www.suse.com/security/cve/CVE-2016-5403/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6258 page", "url": "https://www.suse.com/security/cve/CVE-2016-6258/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6351 page", "url": "https://www.suse.com/security/cve/CVE-2016-6351/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2016-08-18T12:48:09Z", "generator": { "date": "2016-08-18T12:48:09Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2100-1", "initial_release_date": "2016-08-18T12:48:09Z", "revision_history": [ { "date": "2016-08-18T12:48:09Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-devel-4.4.4_07-37.1.i586", "product": { "name": "xen-devel-4.4.4_07-37.1.i586", "product_id": "xen-devel-4.4.4_07-37.1.i586" } }, { "category": "product_version", "name": "xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "product": { "name": "xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "product_id": "xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586" } }, { "category": "product_version", "name": "xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "product": { "name": "xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "product_id": "xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.4.4_07-37.1.i586", "product": { "name": "xen-libs-4.4.4_07-37.1.i586", "product_id": "xen-libs-4.4.4_07-37.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.4.4_07-37.1.i586", "product": { "name": "xen-tools-domU-4.4.4_07-37.1.i586", "product_id": "xen-tools-domU-4.4.4_07-37.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.4.4_07-37.1.x86_64", "product": { "name": "xen-devel-4.4.4_07-37.1.x86_64", "product_id": "xen-devel-4.4.4_07-37.1.x86_64" } }, { "category": "product_version", "name": "xen-4.4.4_07-37.1.x86_64", "product": { "name": "xen-4.4.4_07-37.1.x86_64", "product_id": "xen-4.4.4_07-37.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.4.4_07-37.1.x86_64", "product": { "name": "xen-doc-html-4.4.4_07-37.1.x86_64", "product_id": "xen-doc-html-4.4.4_07-37.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "product": { "name": "xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "product_id": "xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.4.4_07-37.1.x86_64", "product": { "name": "xen-libs-4.4.4_07-37.1.x86_64", "product_id": "xen-libs-4.4.4_07-37.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.4.4_07-37.1.x86_64", "product": { "name": "xen-libs-32bit-4.4.4_07-37.1.x86_64", "product_id": "xen-libs-32bit-4.4.4_07-37.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.4.4_07-37.1.x86_64", "product": { "name": "xen-tools-4.4.4_07-37.1.x86_64", "product_id": "xen-tools-4.4.4_07-37.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.4.4_07-37.1.x86_64", "product": { "name": "xen-tools-domU-4.4.4_07-37.1.x86_64", "product_id": "xen-tools-domU-4.4.4_07-37.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.4.4_07-37.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586" }, "product_reference": "xen-devel-4.4.4_07-37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.4.4_07-37.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" }, "product_reference": "xen-devel-4.4.4_07-37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.4.4_07-37.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64" }, "product_reference": "xen-4.4.4_07-37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.4.4_07-37.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64" }, "product_reference": "xen-doc-html-4.4.4_07-37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586" }, "product_reference": "xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64" }, "product_reference": "xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586" }, "product_reference": "xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.4_07-37.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586" }, "product_reference": "xen-libs-4.4.4_07-37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.4_07-37.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64" }, "product_reference": "xen-libs-4.4.4_07-37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.4.4_07-37.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64" }, "product_reference": "xen-libs-32bit-4.4.4_07-37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.4.4_07-37.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64" }, "product_reference": "xen-tools-4.4.4_07-37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.4.4_07-37.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586" }, "product_reference": "xen-tools-domU-4.4.4_07-37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.4.4_07-37.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64" }, "product_reference": "xen-tools-domU-4.4.4_07-37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.4.4_07-37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64" }, "product_reference": "xen-4.4.4_07-37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.4.4_07-37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64" }, "product_reference": "xen-doc-html-4.4.4_07-37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586" }, "product_reference": "xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64" }, "product_reference": "xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586" }, "product_reference": "xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.4_07-37.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586" }, "product_reference": "xen-libs-4.4.4_07-37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.4_07-37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64" }, "product_reference": "xen-libs-4.4.4_07-37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.4.4_07-37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64" }, "product_reference": "xen-libs-32bit-4.4.4_07-37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.4.4_07-37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64" }, "product_reference": "xen-tools-4.4.4_07-37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.4.4_07-37.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586" }, "product_reference": "xen-tools-domU-4.4.4_07-37.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.4.4_07-37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64" }, "product_reference": "xen-tools-domU-4.4.4_07-37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-3672", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3672" } ], "notes": [ { "category": "general", "text": "The qemu implementation in libvirt before 1.3.0 and Xen allows local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3672", "url": "https://www.suse.com/security/cve/CVE-2014-3672" }, { "category": "external", "summary": "SUSE Bug 981264 for CVE-2014-3672", "url": "https://bugzilla.suse.com/981264" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "low" } ], "title": "CVE-2014-3672" }, { "cve": "CVE-2016-3158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3158" } ], "notes": [ { "category": "general", "text": "The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3158", "url": "https://www.suse.com/security/cve/CVE-2016-3158" }, { "category": "external", "summary": "SUSE Bug 973188 for CVE-2016-3158", "url": "https://bugzilla.suse.com/973188" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "low" } ], "title": "CVE-2016-3158" }, { "cve": "CVE-2016-3159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3159" } ], "notes": [ { "category": "general", "text": "The fpu_fxrstor function in arch/x86/i387.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3159", "url": "https://www.suse.com/security/cve/CVE-2016-3159" }, { "category": "external", "summary": "SUSE Bug 973188 for CVE-2016-3159", "url": "https://bugzilla.suse.com/973188" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "low" } ], "title": "CVE-2016-3159" }, { "cve": "CVE-2016-3710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3710" } ], "notes": [ { "category": "general", "text": "The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \"Dark Portal\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3710", "url": "https://www.suse.com/security/cve/CVE-2016-3710" }, { "category": "external", "summary": "SUSE Bug 978158 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978158" }, { "category": "external", "summary": "SUSE Bug 978164 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978164" }, { "category": "external", "summary": "SUSE Bug 978167 for CVE-2016-3710", "url": "https://bugzilla.suse.com/978167" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "moderate" } ], "title": "CVE-2016-3710" }, { "cve": "CVE-2016-3960", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3960" } ], "notes": [ { "category": "general", "text": "Integer overflow in the x86 shadow pagetable code in Xen allows local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3960", "url": "https://www.suse.com/security/cve/CVE-2016-3960" }, { "category": "external", "summary": "SUSE Bug 1072223 for CVE-2016-3960", "url": "https://bugzilla.suse.com/1072223" }, { "category": "external", "summary": "SUSE Bug 974038 for CVE-2016-3960", "url": "https://bugzilla.suse.com/974038" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "important" } ], "title": "CVE-2016-3960" }, { "cve": "CVE-2016-4001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4001" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4001", "url": "https://www.suse.com/security/cve/CVE-2016-4001" }, { "category": "external", "summary": "SUSE Bug 975128 for CVE-2016-4001", "url": "https://bugzilla.suse.com/975128" }, { "category": "external", "summary": "SUSE Bug 975130 for CVE-2016-4001", "url": "https://bugzilla.suse.com/975130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "moderate" } ], "title": "CVE-2016-4001" }, { "cve": "CVE-2016-4002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4002" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4002", "url": "https://www.suse.com/security/cve/CVE-2016-4002" }, { "category": "external", "summary": "SUSE Bug 975136 for CVE-2016-4002", "url": "https://bugzilla.suse.com/975136" }, { "category": "external", "summary": "SUSE Bug 975138 for CVE-2016-4002", "url": "https://bugzilla.suse.com/975138" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "moderate" } ], "title": "CVE-2016-4002" }, { "cve": "CVE-2016-4020", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4020" } ], "notes": [ { "category": "general", "text": "The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4020", "url": "https://www.suse.com/security/cve/CVE-2016-4020" }, { "category": "external", "summary": "SUSE Bug 975700 for CVE-2016-4020", "url": "https://bugzilla.suse.com/975700" }, { "category": "external", "summary": "SUSE Bug 975907 for CVE-2016-4020", "url": "https://bugzilla.suse.com/975907" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "low" } ], "title": "CVE-2016-4020" }, { "cve": "CVE-2016-4037", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4037" } ], "notes": [ { "category": "general", "text": "The ehci_advance_state function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list, a related issue to CVE-2015-8558.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4037", "url": "https://www.suse.com/security/cve/CVE-2016-4037" }, { "category": "external", "summary": "SUSE Bug 959005 for CVE-2016-4037", "url": "https://bugzilla.suse.com/959005" }, { "category": "external", "summary": "SUSE Bug 959006 for CVE-2016-4037", "url": "https://bugzilla.suse.com/959006" }, { "category": "external", "summary": "SUSE Bug 976109 for CVE-2016-4037", "url": "https://bugzilla.suse.com/976109" }, { "category": "external", "summary": "SUSE Bug 976111 for CVE-2016-4037", "url": "https://bugzilla.suse.com/976111" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "low" } ], "title": "CVE-2016-4037" }, { "cve": "CVE-2016-4439", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4439" } ], "notes": [ { "category": "general", "text": "The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4439", "url": "https://www.suse.com/security/cve/CVE-2016-4439" }, { "category": "external", "summary": "SUSE Bug 980711 for CVE-2016-4439", "url": "https://bugzilla.suse.com/980711" }, { "category": "external", "summary": "SUSE Bug 980716 for CVE-2016-4439", "url": "https://bugzilla.suse.com/980716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "low" } ], "title": "CVE-2016-4439" }, { "cve": "CVE-2016-4441", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4441" } ], "notes": [ { "category": "general", "text": "The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4441", "url": "https://www.suse.com/security/cve/CVE-2016-4441" }, { "category": "external", "summary": "SUSE Bug 980723 for CVE-2016-4441", "url": "https://bugzilla.suse.com/980723" }, { "category": "external", "summary": "SUSE Bug 980724 for CVE-2016-4441", "url": "https://bugzilla.suse.com/980724" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "low" } ], "title": "CVE-2016-4441" }, { "cve": "CVE-2016-4453", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4453" } ], "notes": [ { "category": "general", "text": "The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4453", "url": "https://www.suse.com/security/cve/CVE-2016-4453" }, { "category": "external", "summary": "SUSE Bug 982223 for CVE-2016-4453", "url": "https://bugzilla.suse.com/982223" }, { "category": "external", "summary": "SUSE Bug 982225 for CVE-2016-4453", "url": "https://bugzilla.suse.com/982225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "low" } ], "title": "CVE-2016-4453" }, { "cve": "CVE-2016-4454", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4454" } ], "notes": [ { "category": "general", "text": "The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4454", "url": "https://www.suse.com/security/cve/CVE-2016-4454" }, { "category": "external", "summary": "SUSE Bug 982222 for CVE-2016-4454", "url": "https://bugzilla.suse.com/982222" }, { "category": "external", "summary": "SUSE Bug 982224 for CVE-2016-4454", "url": "https://bugzilla.suse.com/982224" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "low" } ], "title": "CVE-2016-4454" }, { "cve": "CVE-2016-4952", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4952" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator), when built with VMWARE PVSCSI paravirtual SCSI bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds array access) via vectors related to the (1) PVSCSI_CMD_SETUP_RINGS or (2) PVSCSI_CMD_SETUP_MSG_RING SCSI command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4952", "url": "https://www.suse.com/security/cve/CVE-2016-4952" }, { "category": "external", "summary": "SUSE Bug 981266 for CVE-2016-4952", "url": "https://bugzilla.suse.com/981266" }, { "category": "external", "summary": "SUSE Bug 981276 for CVE-2016-4952", "url": "https://bugzilla.suse.com/981276" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "low" } ], "title": "CVE-2016-4952" }, { "cve": "CVE-2016-4962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4962" } ], "notes": [ { "category": "general", "text": "The libxl device-handling in Xen 4.6.x and earlier allows local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled areas of xenstore.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4962", "url": "https://www.suse.com/security/cve/CVE-2016-4962" }, { "category": "external", "summary": "SUSE Bug 979620 for CVE-2016-4962", "url": "https://bugzilla.suse.com/979620" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "moderate" } ], "title": "CVE-2016-4962" }, { "cve": "CVE-2016-4963", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4963" } ], "notes": [ { "category": "general", "text": "The libxl device-handling in Xen through 4.6.x allows local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4963", "url": "https://www.suse.com/security/cve/CVE-2016-4963" }, { "category": "external", "summary": "SUSE Bug 979641 for CVE-2016-4963", "url": "https://bugzilla.suse.com/979641" }, { "category": "external", "summary": "SUSE Bug 979670 for CVE-2016-4963", "url": "https://bugzilla.suse.com/979670" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "low" } ], "title": "CVE-2016-4963" }, { "cve": "CVE-2016-5105", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5105" } ], "notes": [ { "category": "general", "text": "The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, uses an uninitialized variable, which allows local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5105", "url": "https://www.suse.com/security/cve/CVE-2016-5105" }, { "category": "external", "summary": "SUSE Bug 982017 for CVE-2016-5105", "url": "https://bugzilla.suse.com/982017" }, { "category": "external", "summary": "SUSE Bug 982024 for CVE-2016-5105", "url": "https://bugzilla.suse.com/982024" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "low" } ], "title": "CVE-2016-5105" }, { "cve": "CVE-2016-5106", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5106" } ], "notes": [ { "category": "general", "text": "The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5106", "url": "https://www.suse.com/security/cve/CVE-2016-5106" }, { "category": "external", "summary": "SUSE Bug 982018 for CVE-2016-5106", "url": "https://bugzilla.suse.com/982018" }, { "category": "external", "summary": "SUSE Bug 982025 for CVE-2016-5106", "url": "https://bugzilla.suse.com/982025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "low" } ], "title": "CVE-2016-5106" }, { "cve": "CVE-2016-5107", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5107" } ], "notes": [ { "category": "general", "text": "The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5107", "url": "https://www.suse.com/security/cve/CVE-2016-5107" }, { "category": "external", "summary": "SUSE Bug 982019 for CVE-2016-5107", "url": "https://bugzilla.suse.com/982019" }, { "category": "external", "summary": "SUSE Bug 982026 for CVE-2016-5107", "url": "https://bugzilla.suse.com/982026" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "low" } ], "title": "CVE-2016-5107" }, { "cve": "CVE-2016-5126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5126" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5126", "url": "https://www.suse.com/security/cve/CVE-2016-5126" }, { "category": "external", "summary": "SUSE Bug 982285 for CVE-2016-5126", "url": "https://bugzilla.suse.com/982285" }, { "category": "external", "summary": "SUSE Bug 982286 for CVE-2016-5126", "url": "https://bugzilla.suse.com/982286" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "low" } ], "title": "CVE-2016-5126" }, { "cve": "CVE-2016-5238", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5238" } ], "notes": [ { "category": "general", "text": "The get_cmd function in hw/scsi/esp.c in QEMU might allow local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5238", "url": "https://www.suse.com/security/cve/CVE-2016-5238" }, { "category": "external", "summary": "SUSE Bug 982959 for CVE-2016-5238", "url": "https://bugzilla.suse.com/982959" }, { "category": "external", "summary": "SUSE Bug 982960 for CVE-2016-5238", "url": "https://bugzilla.suse.com/982960" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "moderate" } ], "title": "CVE-2016-5238" }, { "cve": "CVE-2016-5337", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5337" } ], "notes": [ { "category": "general", "text": "The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5337", "url": "https://www.suse.com/security/cve/CVE-2016-5337" }, { "category": "external", "summary": "SUSE Bug 983961 for CVE-2016-5337", "url": "https://bugzilla.suse.com/983961" }, { "category": "external", "summary": "SUSE Bug 983973 for CVE-2016-5337", "url": "https://bugzilla.suse.com/983973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "low" } ], "title": "CVE-2016-5337" }, { "cve": "CVE-2016-5338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5338" } ], "notes": [ { "category": "general", "text": "The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5338", "url": "https://www.suse.com/security/cve/CVE-2016-5338" }, { "category": "external", "summary": "SUSE Bug 983982 for CVE-2016-5338", "url": "https://bugzilla.suse.com/983982" }, { "category": "external", "summary": "SUSE Bug 983984 for CVE-2016-5338", "url": "https://bugzilla.suse.com/983984" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "low" } ], "title": "CVE-2016-5338" }, { "cve": "CVE-2016-5403", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5403" } ], "notes": [ { "category": "general", "text": "The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5403", "url": "https://www.suse.com/security/cve/CVE-2016-5403" }, { "category": "external", "summary": "SUSE Bug 990923 for CVE-2016-5403", "url": "https://bugzilla.suse.com/990923" }, { "category": "external", "summary": "SUSE Bug 991080 for CVE-2016-5403", "url": "https://bugzilla.suse.com/991080" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "low" } ], "title": "CVE-2016-5403" }, { "cve": "CVE-2016-6258", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6258" } ], "notes": [ { "category": "general", "text": "The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6258", "url": "https://www.suse.com/security/cve/CVE-2016-6258" }, { "category": "external", "summary": "SUSE Bug 1072198 for CVE-2016-6258", "url": "https://bugzilla.suse.com/1072198" }, { "category": "external", "summary": "SUSE Bug 1072223 for CVE-2016-6258", "url": "https://bugzilla.suse.com/1072223" }, { "category": "external", "summary": "SUSE Bug 988675 for CVE-2016-6258", "url": "https://bugzilla.suse.com/988675" }, { "category": "external", "summary": "SUSE Bug 988692 for CVE-2016-6258", "url": "https://bugzilla.suse.com/988692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "important" } ], "title": "CVE-2016-6258" }, { "cve": "CVE-2016-6351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6351" } ], "notes": [ { "category": "general", "text": "The esp_do_dma function in hw/scsi/esp.c in QEMU (aka Quick Emulator), when built with ESP/NCR53C9x controller emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the QEMU host via vectors involving DMA read into ESP command buffer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6351", "url": "https://www.suse.com/security/cve/CVE-2016-6351" }, { "category": "external", "summary": "SUSE Bug 990835 for CVE-2016-6351", "url": "https://bugzilla.suse.com/990835" }, { "category": "external", "summary": "SUSE Bug 990843 for CVE-2016-6351", "url": "https://bugzilla.suse.com/990843" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_07_3.0.101_77-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_07_3.0.101_77-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_07-37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_07-37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-18T12:48:09Z", "details": "low" } ], "title": "CVE-2016-6351" } ] }
ghsa-p6hq-65m2-r4jg
Vulnerability from github
Published
2022-05-13 01:07
Modified
2022-05-13 01:07
Severity ?
VLAI Severity ?
Details
The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.
{ "affected": [], "aliases": [ "CVE-2016-3710" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-05-11T21:59:00Z", "severity": "HIGH" }, "details": "The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \"Dark Portal\" issue.", "id": "GHSA-p6hq-65m2-r4jg", "modified": "2022-05-13T01:07:34Z", "published": "2022-05-13T01:07:34Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3710" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2016:1224" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862" }, { "type": "WEB", "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01197.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-0724.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-0725.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-0997.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-0999.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1000.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1001.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1002.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1019.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1943.html" }, { "type": "WEB", "url": "http://support.citrix.com/article/CTX212736" }, { "type": "WEB", "url": "http://www.debian.org/security/2016/dsa-3573" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/05/09/3" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/90316" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1035794" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2974-1" }, { "type": "WEB", "url": "http://xenbits.xen.org/xsa/advisory-179.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
rhsa-2016:0999
Vulnerability from csaf_redhat
Published
2016-05-10 04:48
Modified
2025-08-02 01:35
Summary
Red Hat Security Advisory: qemu-kvm-rhev security update
Notes
Topic
An update for qemu-kvm-rhev is now available for Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager.
Security Fix(es):
* An out-of-bounds read/write access flaw was found in the way QEMU's VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations via I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host's QEMU process. (CVE-2016-3710)
Red Hat would like to thank Wei Xiao (360 Marvel Team) and Qinghao Tang (360 Marvel Team) for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for qemu-kvm-rhev is now available for Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager.\n\nSecurity Fix(es):\n\n* An out-of-bounds read/write access flaw was found in the way QEMU\u0027s VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations via I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host\u0027s QEMU process. (CVE-2016-3710)\n\nRed Hat would like to thank Wei Xiao (360 Marvel Team) and Qinghao Tang (360 Marvel Team) for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0999", "url": "https://access.redhat.com/errata/RHSA-2016:0999" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1331401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331401" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0999.json" } ], "title": "Red Hat Security Advisory: qemu-kvm-rhev security update", "tracking": { "current_release_date": "2025-08-02T01:35:45+00:00", "generator": { "date": "2025-08-02T01:35:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:0999", "initial_release_date": "2016-05-10T04:48:30+00:00", "revision_history": [ { "date": "2016-05-10T04:48:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-05-10T04:48:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:35:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:5::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "product_id": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard-devel-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard-tools-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "product": { "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "product_id": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.3.0-31.el7_2.13?arch=src\u0026epoch=10" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0:libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0:libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0:libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0:qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0:qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src" }, "product_reference": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "relates_to_product_reference": "7Server-RH7-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0:qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0:qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-5.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Qinghao Tang", "Wei Xiao" ], "organization": "360.cn Marvel Team" } ], "cve": "CVE-2016-3710", "discovery_date": "2016-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331401" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read/write access flaw was found in the way QEMU\u0027s VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations using I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host\u0027s QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: incorrect banked access bounds checking in vga module", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-5.0:libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-5.0:libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-5.0:libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-5.0:qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-5.0:qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-5.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "7Server-RH7-RHOS-5.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-5.0:qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-5.0:qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3710" }, { "category": "external", "summary": "RHBZ#1331401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331401" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3710", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3710" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3710", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3710" } ], "release_date": "2016-05-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-10T04:48:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.", "product_ids": [ "7Server-RH7-RHOS-5.0:libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-5.0:libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-5.0:libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-5.0:qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-5.0:qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-5.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "7Server-RH7-RHOS-5.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-5.0:qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-5.0:qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0999" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-5.0:libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-5.0:libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-5.0:libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-5.0:qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-5.0:qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-5.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "7Server-RH7-RHOS-5.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-5.0:qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-5.0:qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: incorrect banked access bounds checking in vga module" } ] }
rhsa-2016:0724
Vulnerability from csaf_redhat
Published
2016-05-09 15:27
Modified
2025-08-02 01:36
Summary
Red Hat Security Advisory: qemu-kvm security update
Notes
Topic
An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm packages provide the user-space component for running virtual machines using KVM.
Security Fix(es):
* An out-of-bounds read/write access flaw was found in the way QEMU's VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations via I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host's QEMU process. (CVE-2016-3710)
Red Hat would like to thank Wei Xiao (360 Marvel Team) and Qinghao Tang (360 Marvel Team) for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm packages provide the user-space component for running virtual machines using KVM.\n\nSecurity Fix(es):\n\n* An out-of-bounds read/write access flaw was found in the way QEMU\u0027s VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations via I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host\u0027s QEMU process. (CVE-2016-3710)\n\nRed Hat would like to thank Wei Xiao (360 Marvel Team) and Qinghao Tang (360 Marvel Team) for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0724", "url": "https://access.redhat.com/errata/RHSA-2016:0724" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1331401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331401" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0724.json" } ], "title": "Red Hat Security Advisory: qemu-kvm security update", "tracking": { "current_release_date": "2025-08-02T01:36:07+00:00", "generator": { "date": "2025-08-02T01:36:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:0724", "initial_release_date": "2016-05-09T15:27:07+00:00", "revision_history": [ { "date": "2016-05-09T15:27:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-05-09T15:27:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:36:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-10:1.5.3-105.el7_2.4.src", "product": { "name": "qemu-kvm-10:1.5.3-105.el7_2.4.src", "product_id": "qemu-kvm-10:1.5.3-105.el7_2.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm@1.5.3-105.el7_2.4?arch=src\u0026epoch=10" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libcacard-10:1.5.3-105.el7_2.4.i686", "product": { "name": "libcacard-10:1.5.3-105.el7_2.4.i686", "product_id": "libcacard-10:1.5.3-105.el7_2.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard@1.5.3-105.el7_2.4?arch=i686\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "product": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "product_id": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-105.el7_2.4?arch=i686\u0026epoch=10" } } }, { "category": "product_version", "name": "libcacard-devel-10:1.5.3-105.el7_2.4.i686", "product": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.i686", "product_id": "libcacard-devel-10:1.5.3-105.el7_2.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard-devel@1.5.3-105.el7_2.4?arch=i686\u0026epoch=10" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "product": { "name": "qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "product_id": "qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm@1.5.3-105.el7_2.4?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "product": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "product_id": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-105.el7_2.4?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "product": { "name": "qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "product_id": "qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-common@1.5.3-105.el7_2.4?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-img-10:1.5.3-105.el7_2.4.x86_64", "product": { "name": "qemu-img-10:1.5.3-105.el7_2.4.x86_64", "product_id": "qemu-img-10:1.5.3-105.el7_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img@1.5.3-105.el7_2.4?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "product": { "name": "qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "product_id": "qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-tools@1.5.3-105.el7_2.4?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "libcacard-10:1.5.3-105.el7_2.4.x86_64", "product": { "name": "libcacard-10:1.5.3-105.el7_2.4.x86_64", "product_id": "libcacard-10:1.5.3-105.el7_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard@1.5.3-105.el7_2.4?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "product": { "name": "libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "product_id": "libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard-tools@1.5.3-105.el7_2.4?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "product": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "product_id": "libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard-devel@1.5.3-105.el7_2.4?arch=x86_64\u0026epoch=10" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libcacard-10:1.5.3-105.el7_2.4.ppc", "product": { "name": "libcacard-10:1.5.3-105.el7_2.4.ppc", "product_id": "libcacard-10:1.5.3-105.el7_2.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard@1.5.3-105.el7_2.4?arch=ppc\u0026epoch=10" } } }, { "category": "product_version", "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "product": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "product_id": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard-devel@1.5.3-105.el7_2.4?arch=ppc\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "product": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "product_id": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-105.el7_2.4?arch=ppc\u0026epoch=10" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "libcacard-10:1.5.3-105.el7_2.4.ppc64", "product": { "name": "libcacard-10:1.5.3-105.el7_2.4.ppc64", "product_id": "libcacard-10:1.5.3-105.el7_2.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard@1.5.3-105.el7_2.4?arch=ppc64\u0026epoch=10" } } }, { "category": "product_version", "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "product": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "product_id": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard-devel@1.5.3-105.el7_2.4?arch=ppc64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "product": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "product_id": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-105.el7_2.4?arch=ppc64\u0026epoch=10" } } }, { "category": "product_version", "name": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "product": { "name": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "product_id": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard-tools@1.5.3-105.el7_2.4?arch=ppc64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-img-10:1.5.3-105.el7_2.4.ppc64", "product": { "name": "qemu-img-10:1.5.3-105.el7_2.4.ppc64", "product_id": "qemu-img-10:1.5.3-105.el7_2.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img@1.5.3-105.el7_2.4?arch=ppc64\u0026epoch=10" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "libcacard-10:1.5.3-105.el7_2.4.ppc64le", "product": { "name": "libcacard-10:1.5.3-105.el7_2.4.ppc64le", "product_id": "libcacard-10:1.5.3-105.el7_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard@1.5.3-105.el7_2.4?arch=ppc64le\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "product": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "product_id": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-105.el7_2.4?arch=ppc64le\u0026epoch=10" } } }, { "category": "product_version", "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "product": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "product_id": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard-devel@1.5.3-105.el7_2.4?arch=ppc64le\u0026epoch=10" } } }, { "category": "product_version", "name": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "product": { "name": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "product_id": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard-tools@1.5.3-105.el7_2.4?arch=ppc64le\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "product": { "name": "qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "product_id": "qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img@1.5.3-105.el7_2.4?arch=ppc64le\u0026epoch=10" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.i686", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.ppc", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.i686", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "qemu-img-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-img-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-10:1.5.3-105.el7_2.4.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src" }, "product_reference": "qemu-kvm-10:1.5.3-105.el7_2.4.src", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.i686", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.ppc", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.i686", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "qemu-img-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-img-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-10:1.5.3-105.el7_2.4.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src" }, "product_reference": "qemu-kvm-10:1.5.3-105.el7_2.4.src", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.i686", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.i686", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "qemu-img-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-img-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-10:1.5.3-105.el7_2.4.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src" }, "product_reference": "qemu-kvm-10:1.5.3-105.el7_2.4.src", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.i686", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.ppc", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.i686", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "qemu-img-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-img-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-10:1.5.3-105.el7_2.4.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src" }, "product_reference": "qemu-kvm-10:1.5.3-105.el7_2.4.src", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.i686", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.ppc", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.i686", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "qemu-img-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-img-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-10:1.5.3-105.el7_2.4.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src" }, "product_reference": "qemu-kvm-10:1.5.3-105.el7_2.4.src", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.i686", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.ppc", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.i686", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "qemu-img-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-img-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-10:1.5.3-105.el7_2.4.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src" }, "product_reference": "qemu-kvm-10:1.5.3-105.el7_2.4.src", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.i686", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.ppc", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "libcacard-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.i686", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "qemu-img-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-img-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-10:1.5.3-105.el7_2.4.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src" }, "product_reference": "qemu-kvm-10:1.5.3-105.el7_2.4.src", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64" }, "product_reference": "qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Qinghao Tang", "Wei Xiao" ], "organization": "360.cn Marvel Team" } ], "cve": "CVE-2016-3710", "discovery_date": "2016-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331401" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read/write access flaw was found in the way QEMU\u0027s VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations using I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host\u0027s QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: incorrect banked access bounds checking in vga module", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686", "7Client-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc", "7Client-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64", "7Client-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le", "7Client-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64", "7Client-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686", "7Client-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "7Client-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "7Client-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "7Client-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "7Client-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "7Client-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "7Client-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "7Client-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64", "7Client-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "7Client-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64", "7Client-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src", "7Client-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "7Client-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "7Client-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "7Client-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "7Client-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "7Client-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "7Client-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "7Client-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "7Client-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686", "7Client-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc", "7Client-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64", "7Client-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le", "7Client-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64", "7Client-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686", "7Client-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "7Client-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "7Client-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "7Client-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "7Client-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "7Client-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "7Client-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "7Client-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64", "7Client-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "7Client-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64", "7Client-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src", "7Client-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "7Client-optional-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "7Client-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "7Client-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "7Client-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "7Client-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "7Client-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "7Client-optional-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "7ComputeNode-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686", "7ComputeNode-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc", "7ComputeNode-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64", "7ComputeNode-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le", "7ComputeNode-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64", "7ComputeNode-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686", "7ComputeNode-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "7ComputeNode-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "7ComputeNode-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "7ComputeNode-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "7ComputeNode-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "7ComputeNode-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "7ComputeNode-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "7ComputeNode-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64", "7ComputeNode-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "7ComputeNode-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64", "7ComputeNode-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src", "7ComputeNode-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "7ComputeNode-optional-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "7ComputeNode-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "7ComputeNode-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "7ComputeNode-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "7ComputeNode-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "7ComputeNode-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "7ComputeNode-optional-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "7Server-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686", "7Server-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc", "7Server-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64", "7Server-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le", "7Server-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64", "7Server-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686", "7Server-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "7Server-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "7Server-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "7Server-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "7Server-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "7Server-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "7Server-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "7Server-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64", "7Server-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "7Server-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64", "7Server-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src", "7Server-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "7Server-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "7Server-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "7Server-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "7Server-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "7Server-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "7Server-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "7Server-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "7Server-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686", "7Server-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc", "7Server-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64", "7Server-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le", "7Server-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64", "7Server-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686", "7Server-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "7Server-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "7Server-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "7Server-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "7Server-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "7Server-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "7Server-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "7Server-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64", "7Server-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "7Server-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64", "7Server-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src", "7Server-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "7Server-optional-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "7Server-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "7Server-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "7Server-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "7Server-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "7Server-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "7Server-optional-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686", "7Workstation-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc", "7Workstation-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686", "7Workstation-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "7Workstation-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src", "7Workstation-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "7Workstation-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "7Workstation-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686", "7Workstation-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc", "7Workstation-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686", "7Workstation-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "7Workstation-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src", "7Workstation-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-optional-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "7Workstation-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "7Workstation-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-optional-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3710" }, { "category": "external", "summary": "RHBZ#1331401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331401" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3710", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3710" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3710", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3710" } ], "release_date": "2016-05-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-09T15:27:07+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.", "product_ids": [ "7Client-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686", "7Client-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc", "7Client-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64", "7Client-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le", "7Client-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64", "7Client-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686", "7Client-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "7Client-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "7Client-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "7Client-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "7Client-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "7Client-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "7Client-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "7Client-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64", "7Client-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "7Client-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64", "7Client-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src", "7Client-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "7Client-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "7Client-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "7Client-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "7Client-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "7Client-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "7Client-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "7Client-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "7Client-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686", "7Client-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc", "7Client-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64", "7Client-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le", "7Client-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64", "7Client-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686", "7Client-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "7Client-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "7Client-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "7Client-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "7Client-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "7Client-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "7Client-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "7Client-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64", "7Client-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "7Client-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64", "7Client-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src", "7Client-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "7Client-optional-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "7Client-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "7Client-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "7Client-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "7Client-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "7Client-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "7Client-optional-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "7ComputeNode-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686", "7ComputeNode-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc", "7ComputeNode-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64", "7ComputeNode-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le", "7ComputeNode-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64", "7ComputeNode-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686", "7ComputeNode-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "7ComputeNode-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "7ComputeNode-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "7ComputeNode-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "7ComputeNode-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "7ComputeNode-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "7ComputeNode-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "7ComputeNode-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64", "7ComputeNode-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "7ComputeNode-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64", "7ComputeNode-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src", "7ComputeNode-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "7ComputeNode-optional-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "7ComputeNode-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "7ComputeNode-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "7ComputeNode-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "7ComputeNode-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "7ComputeNode-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "7ComputeNode-optional-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "7Server-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686", "7Server-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc", "7Server-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64", "7Server-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le", "7Server-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64", "7Server-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686", "7Server-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "7Server-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "7Server-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "7Server-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "7Server-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "7Server-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "7Server-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "7Server-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64", "7Server-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "7Server-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64", "7Server-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src", "7Server-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "7Server-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "7Server-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "7Server-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "7Server-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "7Server-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "7Server-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "7Server-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "7Server-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686", "7Server-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc", "7Server-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64", "7Server-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le", "7Server-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64", "7Server-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686", "7Server-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "7Server-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "7Server-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "7Server-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "7Server-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "7Server-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "7Server-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "7Server-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64", "7Server-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "7Server-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64", "7Server-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src", "7Server-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "7Server-optional-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "7Server-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "7Server-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "7Server-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "7Server-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "7Server-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "7Server-optional-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686", "7Workstation-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc", "7Workstation-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686", "7Workstation-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "7Workstation-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src", "7Workstation-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "7Workstation-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "7Workstation-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686", "7Workstation-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc", "7Workstation-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686", "7Workstation-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "7Workstation-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src", "7Workstation-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-optional-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "7Workstation-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "7Workstation-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-optional-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0724" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686", "7Client-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc", "7Client-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64", "7Client-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le", "7Client-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64", "7Client-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686", "7Client-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "7Client-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "7Client-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "7Client-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "7Client-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "7Client-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "7Client-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "7Client-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64", "7Client-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "7Client-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64", "7Client-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src", "7Client-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "7Client-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "7Client-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "7Client-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "7Client-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "7Client-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "7Client-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "7Client-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "7Client-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686", "7Client-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc", "7Client-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64", "7Client-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le", "7Client-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64", "7Client-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686", "7Client-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "7Client-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "7Client-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "7Client-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "7Client-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "7Client-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "7Client-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "7Client-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64", "7Client-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "7Client-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64", "7Client-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src", "7Client-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "7Client-optional-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "7Client-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "7Client-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "7Client-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "7Client-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "7Client-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "7Client-optional-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "7ComputeNode-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686", "7ComputeNode-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc", "7ComputeNode-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64", "7ComputeNode-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le", "7ComputeNode-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64", "7ComputeNode-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686", "7ComputeNode-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "7ComputeNode-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "7ComputeNode-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "7ComputeNode-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "7ComputeNode-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "7ComputeNode-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "7ComputeNode-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "7ComputeNode-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64", "7ComputeNode-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "7ComputeNode-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64", "7ComputeNode-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src", "7ComputeNode-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "7ComputeNode-optional-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "7ComputeNode-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "7ComputeNode-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "7ComputeNode-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "7ComputeNode-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "7ComputeNode-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "7ComputeNode-optional-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "7Server-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686", "7Server-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc", "7Server-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64", "7Server-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le", "7Server-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64", "7Server-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686", "7Server-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "7Server-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "7Server-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "7Server-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "7Server-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "7Server-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "7Server-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "7Server-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64", "7Server-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "7Server-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64", "7Server-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src", "7Server-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "7Server-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "7Server-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "7Server-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "7Server-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "7Server-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "7Server-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "7Server-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "7Server-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686", "7Server-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc", "7Server-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64", "7Server-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le", "7Server-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64", "7Server-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686", "7Server-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "7Server-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "7Server-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "7Server-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "7Server-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "7Server-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "7Server-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "7Server-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64", "7Server-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "7Server-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64", "7Server-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src", "7Server-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "7Server-optional-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "7Server-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "7Server-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "7Server-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "7Server-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "7Server-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "7Server-optional-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686", "7Workstation-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc", "7Workstation-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686", "7Workstation-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "7Workstation-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src", "7Workstation-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "7Workstation-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "7Workstation-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.i686", "7Workstation-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc", "7Workstation-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-optional-7.2.Z:libcacard-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.i686", "7Workstation-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc", "7Workstation-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-optional-7.2.Z:libcacard-devel-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-optional-7.2.Z:libcacard-tools-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-optional-7.2.Z:qemu-img-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.src", "7Workstation-optional-7.2.Z:qemu-kvm-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-optional-7.2.Z:qemu-kvm-common-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.i686", "7Workstation-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc", "7Workstation-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64", "7Workstation-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.ppc64le", "7Workstation-optional-7.2.Z:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.4.x86_64", "7Workstation-optional-7.2.Z:qemu-kvm-tools-10:1.5.3-105.el7_2.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: incorrect banked access bounds checking in vga module" } ] }
rhsa-2016:1001
Vulnerability from csaf_redhat
Published
2016-05-10 05:04
Modified
2025-08-02 01:35
Summary
Red Hat Security Advisory: qemu-kvm-rhev security update
Notes
Topic
An update for qemu-kvm-rhev is now available for Red Hat Enterprise Linux
OpenStack Platform 7.0 (Kilo) for RHEL 7.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Details
KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the
user-space component for running virtual machines using KVM in environments
managed by Red Hat Enterprise Virtualization Manager.
Security Fix:
* An out-of-bounds read/write access flaw was found in the way QEMU's VGA
emulation with VESA BIOS Extensions (VBE) support performed read/write
operations using I/O port methods. A privileged guest user could use
this flaw to execute arbitrary code on the host with the privileges of the
host's QEMU process. (CVE-2016-3710)
Red Hat would like to thank Wei Xiao (360 Marvel Team) and Qinghao Tang
(360 Marvel Team) for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for qemu-kvm-rhev is now available for Red Hat Enterprise Linux\nOpenStack Platform 7.0 (Kilo) for RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the\nuser-space component for running virtual machines using KVM in environments \nmanaged by Red Hat Enterprise Virtualization Manager.\n \nSecurity Fix: \n \n* An out-of-bounds read/write access flaw was found in the way QEMU\u0027s VGA \nemulation with VESA BIOS Extensions (VBE) support performed read/write\noperations using I/O port methods. A privileged guest user could use\nthis flaw to execute arbitrary code on the host with the privileges of the \nhost\u0027s QEMU process. (CVE-2016-3710)\n \nRed Hat would like to thank Wei Xiao (360 Marvel Team) and Qinghao Tang \n(360 Marvel Team) for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1001", "url": "https://access.redhat.com/errata/RHSA-2016:1001" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1331401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331401" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1001.json" } ], "title": "Red Hat Security Advisory: qemu-kvm-rhev security update", "tracking": { "current_release_date": "2025-08-02T01:35:54+00:00", "generator": { "date": "2025-08-02T01:35:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:1001", "initial_release_date": "2016-05-10T05:04:27+00:00", "revision_history": [ { "date": "2016-05-10T05:04:27+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-05-10T05:04:27+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:35:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7", "product_id": "7Server-RH7-RHOS-7.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:7::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "product_id": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard-tools-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "product": { "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "product_id": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.3.0-31.el7_2.13?arch=src\u0026epoch=10" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7", "product_id": "7Server-RH7-RHOS-7.0:libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-7.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7", "product_id": "7Server-RH7-RHOS-7.0:libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-7.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7", "product_id": "7Server-RH7-RHOS-7.0:qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-7.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7", "product_id": "7Server-RH7-RHOS-7.0:qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-7.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src as a component of Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7", "product_id": "7Server-RH7-RHOS-7.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src" }, "product_reference": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "relates_to_product_reference": "7Server-RH7-RHOS-7.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7", "product_id": "7Server-RH7-RHOS-7.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-7.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7", "product_id": "7Server-RH7-RHOS-7.0:qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-7.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7", "product_id": "7Server-RH7-RHOS-7.0:qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-7.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Qinghao Tang", "Wei Xiao" ], "organization": "360.cn Marvel Team" } ], "cve": "CVE-2016-3710", "discovery_date": "2016-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331401" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read/write access flaw was found in the way QEMU\u0027s VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations using I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host\u0027s QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: incorrect banked access bounds checking in vga module", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-7.0:libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-7.0:libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-7.0:qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-7.0:qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-7.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "7Server-RH7-RHOS-7.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-7.0:qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-7.0:qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3710" }, { "category": "external", "summary": "RHBZ#1331401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331401" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3710", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3710" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3710", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3710" } ], "release_date": "2016-05-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-10T05:04:27+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-7.0:libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-7.0:libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-7.0:qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-7.0:qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-7.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "7Server-RH7-RHOS-7.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-7.0:qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-7.0:qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1001" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-7.0:libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-7.0:libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-7.0:qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-7.0:qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-7.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "7Server-RH7-RHOS-7.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-7.0:qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-7.0:qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: incorrect banked access bounds checking in vga module" } ] }
rhsa-2016:0997
Vulnerability from csaf_redhat
Published
2016-05-10 04:19
Modified
2025-08-02 01:36
Summary
Red Hat Security Advisory: qemu-kvm security update
Notes
Topic
An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm packages provide the user-space component for running virtual machines using KVM.
Security Fix(es):
* An out-of-bounds read/write access flaw was found in the way QEMU's VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations via I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host's QEMU process. (CVE-2016-3710)
Red Hat would like to thank Wei Xiao (360 Marvel Team) and Qinghao Tang (360 Marvel Team) for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm packages provide the user-space component for running virtual machines using KVM.\n\nSecurity Fix(es):\n\n* An out-of-bounds read/write access flaw was found in the way QEMU\u0027s VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations via I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host\u0027s QEMU process. (CVE-2016-3710)\n\nRed Hat would like to thank Wei Xiao (360 Marvel Team) and Qinghao Tang (360 Marvel Team) for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0997", "url": "https://access.redhat.com/errata/RHSA-2016:0997" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1331401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331401" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0997.json" } ], "title": "Red Hat Security Advisory: qemu-kvm security update", "tracking": { "current_release_date": "2025-08-02T01:36:02+00:00", "generator": { "date": "2025-08-02T01:36:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:0997", "initial_release_date": "2016-05-10T04:19:05+00:00", "revision_history": [ { "date": "2016-05-10T04:19:05+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-05-10T04:19:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:36:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64", "product": { "name": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64", "product_id": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.491.el6_8.1?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64", "product": { "name": "qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64", "product_id": "qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-tools@0.12.1.2-2.491.el6_8.1?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "product": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.491.el6_8.1?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64", "product": { "name": "qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64", "product_id": "qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img@0.12.1.2-2.491.el6_8.1?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64", "product": { "name": "qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64", "product_id": "qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.491.el6_8.1?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686", "product": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686", "product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.491.el6_8.1?arch=i686\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686", "product": { "name": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686", "product_id": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.491.el6_8.1?arch=i686\u0026epoch=2" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src", "product": { "name": "qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src", "product_id": "qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.491.el6_8.1?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64", "product": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64", "product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.491.el6_8.1?arch=ppc64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64", "product": { "name": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64", "product_id": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.491.el6_8.1?arch=ppc64\u0026epoch=2" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Qinghao Tang", "Wei Xiao" ], "organization": "360.cn Marvel Team" } ], "cve": "CVE-2016-3710", "discovery_date": "2016-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331401" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read/write access flaw was found in the way QEMU\u0027s VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations using I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host\u0027s QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: incorrect banked access bounds checking in vga module", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686", "6Client-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64", "6Client-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Client-6.8.z:qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Client-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src", "6Client-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Client-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686", "6Client-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64", "6Client-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Client-6.8.z:qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64", "6ComputeNode-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686", "6ComputeNode-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64", "6ComputeNode-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64", "6ComputeNode-6.8.z:qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64", "6ComputeNode-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src", "6ComputeNode-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64", "6ComputeNode-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686", "6ComputeNode-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64", "6ComputeNode-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "6ComputeNode-6.8.z:qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Server-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686", "6Server-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64", "6Server-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Server-6.8.z:qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Server-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src", "6Server-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Server-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686", "6Server-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64", "6Server-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Server-6.8.z:qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Workstation-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686", "6Workstation-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64", "6Workstation-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Workstation-6.8.z:qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Workstation-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src", "6Workstation-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Workstation-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686", "6Workstation-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64", "6Workstation-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Workstation-6.8.z:qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3710" }, { "category": "external", "summary": "RHBZ#1331401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331401" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3710", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3710" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3710", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3710" } ], "release_date": "2016-05-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-10T04:19:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.", "product_ids": [ "6Client-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686", "6Client-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64", "6Client-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Client-6.8.z:qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Client-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src", "6Client-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Client-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686", "6Client-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64", "6Client-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Client-6.8.z:qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64", "6ComputeNode-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686", "6ComputeNode-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64", "6ComputeNode-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64", "6ComputeNode-6.8.z:qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64", "6ComputeNode-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src", "6ComputeNode-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64", "6ComputeNode-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686", "6ComputeNode-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64", "6ComputeNode-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "6ComputeNode-6.8.z:qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Server-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686", "6Server-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64", "6Server-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Server-6.8.z:qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Server-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src", "6Server-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Server-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686", "6Server-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64", "6Server-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Server-6.8.z:qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Workstation-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686", "6Workstation-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64", "6Workstation-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Workstation-6.8.z:qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Workstation-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src", "6Workstation-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Workstation-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686", "6Workstation-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64", "6Workstation-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Workstation-6.8.z:qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0997" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686", "6Client-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64", "6Client-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Client-6.8.z:qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Client-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src", "6Client-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Client-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686", "6Client-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64", "6Client-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Client-6.8.z:qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64", "6ComputeNode-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686", "6ComputeNode-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64", "6ComputeNode-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64", "6ComputeNode-6.8.z:qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64", "6ComputeNode-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src", "6ComputeNode-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64", "6ComputeNode-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686", "6ComputeNode-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64", "6ComputeNode-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "6ComputeNode-6.8.z:qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Server-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686", "6Server-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64", "6Server-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Server-6.8.z:qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Server-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src", "6Server-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Server-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686", "6Server-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64", "6Server-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Server-6.8.z:qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Workstation-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.i686", "6Workstation-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.ppc64", "6Workstation-6.8.z:qemu-guest-agent-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Workstation-6.8.z:qemu-img-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Workstation-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.src", "6Workstation-6.8.z:qemu-kvm-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Workstation-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.i686", "6Workstation-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.ppc64", "6Workstation-6.8.z:qemu-kvm-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Workstation-6.8.z:qemu-kvm-tools-2:0.12.1.2-2.491.el6_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: incorrect banked access bounds checking in vga module" } ] }
rhsa-2016:0725
Vulnerability from csaf_redhat
Published
2016-05-09 15:11
Modified
2025-08-02 01:36
Summary
Red Hat Security Advisory: qemu-kvm-rhev security update
Notes
Topic
An update for qemu-kvm-rhev is now available for Red Hat Enterprise Virtualization.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager.
Security Fix(es):
* An out-of-bounds read/write access flaw was found in the way QEMU's VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations via I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host's QEMU process. (CVE-2016-3710)
Red Hat would like to thank Wei Xiao (360 Marvel Team) and Qinghao Tang (360 Marvel Team) for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for qemu-kvm-rhev is now available for Red Hat Enterprise Virtualization.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager.\n\nSecurity Fix(es):\n\n* An out-of-bounds read/write access flaw was found in the way QEMU\u0027s VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations via I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host\u0027s QEMU process. (CVE-2016-3710)\n\nRed Hat would like to thank Wei Xiao (360 Marvel Team) and Qinghao Tang (360 Marvel Team) for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0725", "url": "https://access.redhat.com/errata/RHSA-2016:0725" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1331401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331401" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0725.json" } ], "title": "Red Hat Security Advisory: qemu-kvm-rhev security update", "tracking": { "current_release_date": "2025-08-02T01:36:07+00:00", "generator": { "date": "2025-08-02T01:36:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:0725", "initial_release_date": "2016-05-09T15:11:45+00:00", "revision_history": [ { "date": "2016-05-09T15:11:45+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-05-09T15:11:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:36:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV-H and VDSM for 7 Hosts", "product": { "name": "RHEV-H and VDSM for 7 Hosts", "product_id": "7Server-RHEV-Agents-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "product_id": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard-devel-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard-tools-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "product": { "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "product_id": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.3.0-31.el7_2.13?arch=src\u0026epoch=10" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.ppc64le", "product": { "name": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.ppc64le", "product_id": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.3.0-31.el7_2.13?arch=ppc64le\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.ppc64le", "product": { "name": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.ppc64le", "product_id": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.3.0-31.el7_2.13?arch=ppc64le\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.ppc64le", "product": { "name": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.ppc64le", "product_id": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.3.0-31.el7_2.13?arch=ppc64le\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-img-rhev-10:2.3.0-31.el7_2.13.ppc64le", "product": { "name": "qemu-img-rhev-10:2.3.0-31.el7_2.13.ppc64le", "product_id": "qemu-img-rhev-10:2.3.0-31.el7_2.13.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img-rhev@2.3.0-31.el7_2.13?arch=ppc64le\u0026epoch=10" } } }, { "category": "product_version", "name": "libcacard-devel-rhev-10:2.3.0-31.el7_2.13.ppc64le", "product": { "name": "libcacard-devel-rhev-10:2.3.0-31.el7_2.13.ppc64le", "product_id": "libcacard-devel-rhev-10:2.3.0-31.el7_2.13.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard-devel-rhev@2.3.0-31.el7_2.13?arch=ppc64le\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.ppc64le", "product": { "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.ppc64le", "product_id": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.3.0-31.el7_2.13?arch=ppc64le\u0026epoch=10" } } }, { "category": "product_version", "name": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.ppc64le", "product": { "name": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.ppc64le", "product_id": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard-tools-rhev@2.3.0-31.el7_2.13?arch=ppc64le\u0026epoch=10" } } }, { "category": "product_version", "name": "libcacard-rhev-10:2.3.0-31.el7_2.13.ppc64le", "product": { "name": "libcacard-rhev-10:2.3.0-31.el7_2.13.ppc64le", "product_id": "libcacard-rhev-10:2.3.0-31.el7_2.13.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard-rhev@2.3.0-31.el7_2.13?arch=ppc64le\u0026epoch=10" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-rhev-10:2.3.0-31.el7_2.13.ppc64le as a component of RHEV-H and VDSM for 7 Hosts", "product_id": "7Server-RHEV-Agents-7:libcacard-devel-rhev-10:2.3.0-31.el7_2.13.ppc64le" }, "product_reference": "libcacard-devel-rhev-10:2.3.0-31.el7_2.13.ppc64le", "relates_to_product_reference": "7Server-RHEV-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of RHEV-H and VDSM for 7 Hosts", "product_id": "7Server-RHEV-Agents-7:libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RHEV-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-rhev-10:2.3.0-31.el7_2.13.ppc64le as a component of RHEV-H and VDSM for 7 Hosts", "product_id": "7Server-RHEV-Agents-7:libcacard-rhev-10:2.3.0-31.el7_2.13.ppc64le" }, "product_reference": "libcacard-rhev-10:2.3.0-31.el7_2.13.ppc64le", "relates_to_product_reference": "7Server-RHEV-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of RHEV-H and VDSM for 7 Hosts", "product_id": "7Server-RHEV-Agents-7:libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RHEV-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.ppc64le as a component of RHEV-H and VDSM for 7 Hosts", "product_id": "7Server-RHEV-Agents-7:libcacard-tools-rhev-10:2.3.0-31.el7_2.13.ppc64le" }, "product_reference": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.ppc64le", "relates_to_product_reference": "7Server-RHEV-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of RHEV-H and VDSM for 7 Hosts", "product_id": "7Server-RHEV-Agents-7:libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RHEV-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-rhev-10:2.3.0-31.el7_2.13.ppc64le as a component of RHEV-H and VDSM for 7 Hosts", "product_id": "7Server-RHEV-Agents-7:qemu-img-rhev-10:2.3.0-31.el7_2.13.ppc64le" }, "product_reference": "qemu-img-rhev-10:2.3.0-31.el7_2.13.ppc64le", "relates_to_product_reference": "7Server-RHEV-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of RHEV-H and VDSM for 7 Hosts", "product_id": "7Server-RHEV-Agents-7:qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RHEV-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.ppc64le as a component of RHEV-H and VDSM for 7 Hosts", "product_id": "7Server-RHEV-Agents-7:qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.ppc64le" }, "product_reference": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.ppc64le", "relates_to_product_reference": "7Server-RHEV-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of RHEV-H and VDSM for 7 Hosts", "product_id": "7Server-RHEV-Agents-7:qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RHEV-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.ppc64le as a component of RHEV-H and VDSM for 7 Hosts", "product_id": "7Server-RHEV-Agents-7:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.ppc64le" }, "product_reference": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.ppc64le", "relates_to_product_reference": "7Server-RHEV-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src as a component of RHEV-H and VDSM for 7 Hosts", "product_id": "7Server-RHEV-Agents-7:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src" }, "product_reference": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "relates_to_product_reference": "7Server-RHEV-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of RHEV-H and VDSM for 7 Hosts", "product_id": "7Server-RHEV-Agents-7:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RHEV-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.ppc64le as a component of RHEV-H and VDSM for 7 Hosts", "product_id": "7Server-RHEV-Agents-7:qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.ppc64le" }, "product_reference": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.ppc64le", "relates_to_product_reference": "7Server-RHEV-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64 as a component of RHEV-H and VDSM for 7 Hosts", "product_id": "7Server-RHEV-Agents-7:qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RHEV-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.ppc64le as a component of RHEV-H and VDSM for 7 Hosts", "product_id": "7Server-RHEV-Agents-7:qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.ppc64le" }, "product_reference": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.ppc64le", "relates_to_product_reference": "7Server-RHEV-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of RHEV-H and VDSM for 7 Hosts", "product_id": "7Server-RHEV-Agents-7:qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RHEV-Agents-7" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Qinghao Tang", "Wei Xiao" ], "organization": "360.cn Marvel Team" } ], "cve": "CVE-2016-3710", "discovery_date": "2016-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331401" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read/write access flaw was found in the way QEMU\u0027s VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations using I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host\u0027s QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: incorrect banked access bounds checking in vga module", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-Agents-7:libcacard-devel-rhev-10:2.3.0-31.el7_2.13.ppc64le", "7Server-RHEV-Agents-7:libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RHEV-Agents-7:libcacard-rhev-10:2.3.0-31.el7_2.13.ppc64le", "7Server-RHEV-Agents-7:libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RHEV-Agents-7:libcacard-tools-rhev-10:2.3.0-31.el7_2.13.ppc64le", "7Server-RHEV-Agents-7:libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RHEV-Agents-7:qemu-img-rhev-10:2.3.0-31.el7_2.13.ppc64le", "7Server-RHEV-Agents-7:qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RHEV-Agents-7:qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.ppc64le", "7Server-RHEV-Agents-7:qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RHEV-Agents-7:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.ppc64le", "7Server-RHEV-Agents-7:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "7Server-RHEV-Agents-7:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RHEV-Agents-7:qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.ppc64le", "7Server-RHEV-Agents-7:qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "7Server-RHEV-Agents-7:qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.ppc64le", "7Server-RHEV-Agents-7:qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3710" }, { "category": "external", "summary": "RHBZ#1331401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331401" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3710", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3710" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3710", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3710" } ], "release_date": "2016-05-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-09T15:11:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.", "product_ids": [ "7Server-RHEV-Agents-7:libcacard-devel-rhev-10:2.3.0-31.el7_2.13.ppc64le", "7Server-RHEV-Agents-7:libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RHEV-Agents-7:libcacard-rhev-10:2.3.0-31.el7_2.13.ppc64le", "7Server-RHEV-Agents-7:libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RHEV-Agents-7:libcacard-tools-rhev-10:2.3.0-31.el7_2.13.ppc64le", "7Server-RHEV-Agents-7:libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RHEV-Agents-7:qemu-img-rhev-10:2.3.0-31.el7_2.13.ppc64le", "7Server-RHEV-Agents-7:qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RHEV-Agents-7:qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.ppc64le", "7Server-RHEV-Agents-7:qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RHEV-Agents-7:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.ppc64le", "7Server-RHEV-Agents-7:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "7Server-RHEV-Agents-7:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RHEV-Agents-7:qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.ppc64le", "7Server-RHEV-Agents-7:qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "7Server-RHEV-Agents-7:qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.ppc64le", "7Server-RHEV-Agents-7:qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0725" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-Agents-7:libcacard-devel-rhev-10:2.3.0-31.el7_2.13.ppc64le", "7Server-RHEV-Agents-7:libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RHEV-Agents-7:libcacard-rhev-10:2.3.0-31.el7_2.13.ppc64le", "7Server-RHEV-Agents-7:libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RHEV-Agents-7:libcacard-tools-rhev-10:2.3.0-31.el7_2.13.ppc64le", "7Server-RHEV-Agents-7:libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RHEV-Agents-7:qemu-img-rhev-10:2.3.0-31.el7_2.13.ppc64le", "7Server-RHEV-Agents-7:qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RHEV-Agents-7:qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.ppc64le", "7Server-RHEV-Agents-7:qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RHEV-Agents-7:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.ppc64le", "7Server-RHEV-Agents-7:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "7Server-RHEV-Agents-7:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RHEV-Agents-7:qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.ppc64le", "7Server-RHEV-Agents-7:qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "7Server-RHEV-Agents-7:qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.ppc64le", "7Server-RHEV-Agents-7:qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: incorrect banked access bounds checking in vga module" } ] }
rhsa-2016:1224
Vulnerability from csaf_redhat
Published
2016-06-13 17:33
Modified
2025-08-02 01:35
Summary
Red Hat Security Advisory: qemu-kvm-rhev security update
Notes
Topic
An update for qemu-kvm-rhev is now available for RHEV-H and Agents for RHEL-6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager.
Security Fix(es):
* An out-of-bounds read/write access flaw was found in the way QEMU's VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations using I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host's QEMU process. (CVE-2016-3710)
Red Hat would like to thank Wei Xiao (360 Marvel Team) and Qinghao Tang (360 Marvel Team) for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for qemu-kvm-rhev is now available for RHEV-H and Agents for RHEL-6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager.\n\nSecurity Fix(es):\n\n* An out-of-bounds read/write access flaw was found in the way QEMU\u0027s VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations using I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host\u0027s QEMU process. (CVE-2016-3710)\n\nRed Hat would like to thank Wei Xiao (360 Marvel Team) and Qinghao Tang (360 Marvel Team) for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1224", "url": "https://access.redhat.com/errata/RHSA-2016:1224" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1331401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331401" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1224.json" } ], "title": "Red Hat Security Advisory: qemu-kvm-rhev security update", "tracking": { "current_release_date": "2025-08-02T01:35:58+00:00", "generator": { "date": "2025-08-02T01:35:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:1224", "initial_release_date": "2016-06-13T17:33:15+00:00", "revision_history": [ { "date": "2016-06-13T17:33:15+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-06-13T17:33:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:35:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV Agents (vdsm)", "product": { "name": "RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:6::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "qemu-img-rhev-2:0.12.1.2-2.479.el6_7.5.x86_64", "product": { "name": "qemu-img-rhev-2:0.12.1.2-2.479.el6_7.5.x86_64", "product_id": "qemu-img-rhev-2:0.12.1.2-2.479.el6_7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img-rhev@0.12.1.2-2.479.el6_7.5?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.479.el6_7.5.x86_64", "product": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.479.el6_7.5.x86_64", "product_id": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.479.el6_7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@0.12.1.2-2.479.el6_7.5?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.479.el6_7.5.x86_64", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.479.el6_7.5.x86_64", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.479.el6_7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.479.el6_7.5?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.479.el6_7.5.x86_64", "product": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.479.el6_7.5.x86_64", "product_id": "qemu-kvm-rhev-tools-2:0.12.1.2-2.479.el6_7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-tools@0.12.1.2-2.479.el6_7.5?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.479.el6_7.5.src", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.479.el6_7.5.src", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.479.el6_7.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.479.el6_7.5?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-img-rhev-2:0.12.1.2-2.479.el6_7.5.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.479.el6_7.5.x86_64" }, "product_reference": "qemu-img-rhev-2:0.12.1.2-2.479.el6_7.5.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.479.el6_7.5.src as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.479.el6_7.5.src" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.479.el6_7.5.src", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.479.el6_7.5.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.479.el6_7.5.x86_64" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.479.el6_7.5.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.479.el6_7.5.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.479.el6_7.5.x86_64" }, "product_reference": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.479.el6_7.5.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.479.el6_7.5.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.479.el6_7.5.x86_64" }, "product_reference": "qemu-kvm-rhev-tools-2:0.12.1.2-2.479.el6_7.5.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Qinghao Tang", "Wei Xiao" ], "organization": "360.cn Marvel Team" } ], "cve": "CVE-2016-3710", "discovery_date": "2016-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331401" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read/write access flaw was found in the way QEMU\u0027s VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations using I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host\u0027s QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: incorrect banked access bounds checking in vga module", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.479.el6_7.5.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.479.el6_7.5.src", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.479.el6_7.5.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.479.el6_7.5.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.479.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3710" }, { "category": "external", "summary": "RHBZ#1331401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331401" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3710", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3710" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3710", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3710" } ], "release_date": "2016-05-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-06-13T17:33:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.", "product_ids": [ "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.479.el6_7.5.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.479.el6_7.5.src", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.479.el6_7.5.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.479.el6_7.5.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.479.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1224" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.479.el6_7.5.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.479.el6_7.5.src", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.479.el6_7.5.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.479.el6_7.5.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.479.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: incorrect banked access bounds checking in vga module" } ] }
rhsa-2016:1943
Vulnerability from csaf_redhat
Published
2016-09-27 16:01
Modified
2025-08-02 01:36
Summary
Red Hat Security Advisory: kvm security update
Notes
Topic
An update for kvm is now available for Red Hat Enterprise Linux 5.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
KVM (for Kernel-based Virtual Machine) is a full virtualization solution for Linux on x86 hardware. Using KVM, one can run multiple virtual machines running unmodified Linux or Windows images. Each virtual machine has private virtualized hardware: a network card, disk, graphics adapter, etc.
Security Fix(es):
* An out-of-bounds read/write access flaw was found in the way QEMU's VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations using I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host's QEMU process. (CVE-2016-3710)
* Quick Emulator(QEMU) built with the virtio framework is vulnerable to an unbounded memory allocation issue. It was found that a malicious guest user could submit more requests than the virtqueue size permits. Processing a request allocates a VirtQueueElement results in unbounded memory allocation on the host controlled by the guest. (CVE-2016-5403)
Red Hat would like to thank Wei Xiao (360 Marvel Team) and Qinghao Tang (360 Marvel Team) for reporting CVE-2016-3710 and hongzhenhao (Marvel Team) for reporting CVE-2016-5403.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kvm is now available for Red Hat Enterprise Linux 5.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "KVM (for Kernel-based Virtual Machine) is a full virtualization solution for Linux on x86 hardware. Using KVM, one can run multiple virtual machines running unmodified Linux or Windows images. Each virtual machine has private virtualized hardware: a network card, disk, graphics adapter, etc.\n\nSecurity Fix(es):\n\n* An out-of-bounds read/write access flaw was found in the way QEMU\u0027s VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations using I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host\u0027s QEMU process. (CVE-2016-3710)\n\n* Quick Emulator(QEMU) built with the virtio framework is vulnerable to an unbounded memory allocation issue. It was found that a malicious guest user could submit more requests than the virtqueue size permits. Processing a request allocates a VirtQueueElement results in unbounded memory allocation on the host controlled by the guest. (CVE-2016-5403)\n\nRed Hat would like to thank Wei Xiao (360 Marvel Team) and Qinghao Tang (360 Marvel Team) for reporting CVE-2016-3710 and hongzhenhao (Marvel Team) for reporting CVE-2016-5403.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1943", "url": "https://access.redhat.com/errata/RHSA-2016:1943" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1331401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331401" }, { "category": "external", "summary": "1358359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358359" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1943.json" } ], "title": "Red Hat Security Advisory: kvm security update", "tracking": { "current_release_date": "2025-08-02T01:36:32+00:00", "generator": { "date": "2025-08-02T01:36:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:1943", "initial_release_date": "2016-09-27T16:01:25+00:00", "revision_history": [ { "date": "2016-09-27T16:01:25+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-09-27T16:01:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:36:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Virtualization (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kmod-kvm-debug-0:83-276.el5_11.x86_64", "product": { "name": "kmod-kvm-debug-0:83-276.el5_11.x86_64", "product_id": "kmod-kvm-debug-0:83-276.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kmod-kvm-debug@83-276.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "kmod-kvm-0:83-276.el5_11.x86_64", "product": { "name": "kmod-kvm-0:83-276.el5_11.x86_64", "product_id": "kmod-kvm-0:83-276.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kmod-kvm@83-276.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-0:83-276.el5_11.x86_64", "product": { "name": "kvm-0:83-276.el5_11.x86_64", "product_id": "kvm-0:83-276.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm@83-276.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-tools-0:83-276.el5_11.x86_64", "product": { "name": "kvm-tools-0:83-276.el5_11.x86_64", "product_id": "kvm-tools-0:83-276.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-tools@83-276.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-qemu-img-0:83-276.el5_11.x86_64", "product": { "name": "kvm-qemu-img-0:83-276.el5_11.x86_64", "product_id": "kvm-qemu-img-0:83-276.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-qemu-img@83-276.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-debuginfo-0:83-276.el5_11.x86_64", "product": { "name": "kvm-debuginfo-0:83-276.el5_11.x86_64", "product_id": "kvm-debuginfo-0:83-276.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-debuginfo@83-276.el5_11?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kvm-0:83-276.el5_11.src", "product": { "name": "kvm-0:83-276.el5_11.src", "product_id": "kvm-0:83-276.el5_11.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm@83-276.el5_11?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-0:83-276.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kmod-kvm-0:83-276.el5_11.x86_64" }, "product_reference": "kmod-kvm-0:83-276.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-debug-0:83-276.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kmod-kvm-debug-0:83-276.el5_11.x86_64" }, "product_reference": "kmod-kvm-debug-0:83-276.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-276.el5_11.src as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kvm-0:83-276.el5_11.src" }, "product_reference": "kvm-0:83-276.el5_11.src", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-276.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kvm-0:83-276.el5_11.x86_64" }, "product_reference": "kvm-0:83-276.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-debuginfo-0:83-276.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kvm-debuginfo-0:83-276.el5_11.x86_64" }, "product_reference": "kvm-debuginfo-0:83-276.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-qemu-img-0:83-276.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kvm-qemu-img-0:83-276.el5_11.x86_64" }, "product_reference": "kvm-qemu-img-0:83-276.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-tools-0:83-276.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.11.Z:kvm-tools-0:83-276.el5_11.x86_64" }, "product_reference": "kvm-tools-0:83-276.el5_11.x86_64", "relates_to_product_reference": "5Client-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-0:83-276.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kmod-kvm-0:83-276.el5_11.x86_64" }, "product_reference": "kmod-kvm-0:83-276.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-debug-0:83-276.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kmod-kvm-debug-0:83-276.el5_11.x86_64" }, "product_reference": "kmod-kvm-debug-0:83-276.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-276.el5_11.src as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kvm-0:83-276.el5_11.src" }, "product_reference": "kvm-0:83-276.el5_11.src", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-276.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kvm-0:83-276.el5_11.x86_64" }, "product_reference": "kvm-0:83-276.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-debuginfo-0:83-276.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kvm-debuginfo-0:83-276.el5_11.x86_64" }, "product_reference": "kvm-debuginfo-0:83-276.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-qemu-img-0:83-276.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kvm-qemu-img-0:83-276.el5_11.x86_64" }, "product_reference": "kvm-qemu-img-0:83-276.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-tools-0:83-276.el5_11.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT-5.11.Z:kvm-tools-0:83-276.el5_11.x86_64" }, "product_reference": "kvm-tools-0:83-276.el5_11.x86_64", "relates_to_product_reference": "5Server-VT-5.11.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Qinghao Tang", "Wei Xiao" ], "organization": "360.cn Marvel Team" } ], "cve": "CVE-2016-3710", "discovery_date": "2016-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331401" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read/write access flaw was found in the way QEMU\u0027s VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations using I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host\u0027s QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: incorrect banked access bounds checking in vga module", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-VT-5.11.Z:kmod-kvm-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kmod-kvm-debug-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-0:83-276.el5_11.src", "5Client-VT-5.11.Z:kvm-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-debuginfo-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-qemu-img-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-tools-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-debug-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-0:83-276.el5_11.src", "5Server-VT-5.11.Z:kvm-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-debuginfo-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-qemu-img-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-tools-0:83-276.el5_11.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3710" }, { "category": "external", "summary": "RHBZ#1331401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331401" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3710", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3710" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3710", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3710" } ], "release_date": "2016-05-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-27T16:01:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: The procedure in the Solution section must be performed before this update will take effect.", "product_ids": [ "5Client-VT-5.11.Z:kmod-kvm-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kmod-kvm-debug-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-0:83-276.el5_11.src", "5Client-VT-5.11.Z:kvm-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-debuginfo-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-qemu-img-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-tools-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-debug-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-0:83-276.el5_11.src", "5Server-VT-5.11.Z:kvm-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-debuginfo-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-qemu-img-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-tools-0:83-276.el5_11.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1943" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-VT-5.11.Z:kmod-kvm-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kmod-kvm-debug-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-0:83-276.el5_11.src", "5Client-VT-5.11.Z:kvm-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-debuginfo-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-qemu-img-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-tools-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-debug-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-0:83-276.el5_11.src", "5Server-VT-5.11.Z:kvm-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-debuginfo-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-qemu-img-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-tools-0:83-276.el5_11.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: incorrect banked access bounds checking in vga module" }, { "acknowledgments": [ { "names": [ "hongzhenhao" ], "organization": "Marvel Team" } ], "cve": "CVE-2016-5403", "discovery_date": "2016-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1358359" } ], "notes": [ { "category": "description", "text": "Quick Emulator (QEMU) built with the virtio framework is vulnerable to an unbounded memory allocation issue. It was found that a malicious guest user could submit more requests than the virtqueue size permits. Processing a request allocates a VirtQueueElement results in unbounded memory allocation on the host controlled by the guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "Qemu: virtio: unbounded memory allocation on host via guest leading to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-VT-5.11.Z:kmod-kvm-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kmod-kvm-debug-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-0:83-276.el5_11.src", "5Client-VT-5.11.Z:kvm-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-debuginfo-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-qemu-img-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-tools-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-debug-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-0:83-276.el5_11.src", "5Server-VT-5.11.Z:kvm-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-debuginfo-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-qemu-img-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-tools-0:83-276.el5_11.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5403" }, { "category": "external", "summary": "RHBZ#1358359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358359" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5403", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5403" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5403", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5403" } ], "release_date": "2016-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-27T16:01:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: The procedure in the Solution section must be performed before this update will take effect.", "product_ids": [ "5Client-VT-5.11.Z:kmod-kvm-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kmod-kvm-debug-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-0:83-276.el5_11.src", "5Client-VT-5.11.Z:kvm-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-debuginfo-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-qemu-img-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-tools-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-debug-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-0:83-276.el5_11.src", "5Server-VT-5.11.Z:kvm-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-debuginfo-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-qemu-img-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-tools-0:83-276.el5_11.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1943" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 2.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L", "version": "3.0" }, "products": [ "5Client-VT-5.11.Z:kmod-kvm-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kmod-kvm-debug-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-0:83-276.el5_11.src", "5Client-VT-5.11.Z:kvm-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-debuginfo-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-qemu-img-0:83-276.el5_11.x86_64", "5Client-VT-5.11.Z:kvm-tools-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kmod-kvm-debug-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-0:83-276.el5_11.src", "5Server-VT-5.11.Z:kvm-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-debuginfo-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-qemu-img-0:83-276.el5_11.x86_64", "5Server-VT-5.11.Z:kvm-tools-0:83-276.el5_11.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Qemu: virtio: unbounded memory allocation on host via guest leading to DoS" } ] }
rhsa-2016:1002
Vulnerability from csaf_redhat
Published
2016-05-10 05:04
Modified
2025-08-02 01:35
Summary
Red Hat Security Advisory: qemu-kvm-rhev security update
Notes
Topic
An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 8.0 (Liberty).
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager.
Security Fix(es):
* An out-of-bounds read/write access flaw was found in the way QEMU's VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations using I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host's QEMU process. (CVE-2016-3710)
Red Hat would like to thank Wei Xiao (360 Marvel Team) and Qinghao Tang (360 Marvel Team) for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 8.0 (Liberty).\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager.\n\nSecurity Fix(es):\n\n* An out-of-bounds read/write access flaw was found in the way QEMU\u0027s VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations using I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host\u0027s QEMU process. (CVE-2016-3710)\n\nRed Hat would like to thank Wei Xiao (360 Marvel Team) and Qinghao Tang (360 Marvel Team) for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1002", "url": "https://access.redhat.com/errata/RHSA-2016:1002" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1331401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331401" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1002.json" } ], "title": "Red Hat Security Advisory: qemu-kvm-rhev security update", "tracking": { "current_release_date": "2025-08-02T01:35:58+00:00", "generator": { "date": "2025-08-02T01:35:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:1002", "initial_release_date": "2016-05-10T05:04:20+00:00", "revision_history": [ { "date": "2016-05-10T05:04:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-05-10T05:04:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:35:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 8.0 (Liberty)", "product": { "name": "Red Hat OpenStack Platform 8.0 (Liberty)", "product_id": "7Server-RH7-RHOS-8.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:8::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "product_id": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard-tools-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "product": { "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "product_id": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.3.0-31.el7_2.13?arch=src\u0026epoch=10" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat OpenStack Platform 8.0 (Liberty)", "product_id": "7Server-RH7-RHOS-8.0:libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat OpenStack Platform 8.0 (Liberty)", "product_id": "7Server-RH7-RHOS-8.0:libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat OpenStack Platform 8.0 (Liberty)", "product_id": "7Server-RH7-RHOS-8.0:qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat OpenStack Platform 8.0 (Liberty)", "product_id": "7Server-RH7-RHOS-8.0:qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src as a component of Red Hat OpenStack Platform 8.0 (Liberty)", "product_id": "7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src" }, "product_reference": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "relates_to_product_reference": "7Server-RH7-RHOS-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat OpenStack Platform 8.0 (Liberty)", "product_id": "7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat OpenStack Platform 8.0 (Liberty)", "product_id": "7Server-RH7-RHOS-8.0:qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat OpenStack Platform 8.0 (Liberty)", "product_id": "7Server-RH7-RHOS-8.0:qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-8.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Qinghao Tang", "Wei Xiao" ], "organization": "360.cn Marvel Team" } ], "cve": "CVE-2016-3710", "discovery_date": "2016-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331401" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read/write access flaw was found in the way QEMU\u0027s VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations using I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host\u0027s QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: incorrect banked access bounds checking in vga module", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-8.0:libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-8.0:libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-8.0:qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-8.0:qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-8.0:qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-8.0:qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3710" }, { "category": "external", "summary": "RHBZ#1331401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331401" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3710", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3710" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3710", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3710" } ], "release_date": "2016-05-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-10T05:04:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-8.0:libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-8.0:libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-8.0:qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-8.0:qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-8.0:qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-8.0:qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1002" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-8.0:libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-8.0:libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-8.0:qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-8.0:qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-8.0:qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-8.0:qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: incorrect banked access bounds checking in vga module" } ] }
rhsa-2016:1019
Vulnerability from csaf_redhat
Published
2016-05-11 01:01
Modified
2025-08-02 01:35
Summary
Red Hat Security Advisory: qemu-kvm-rhev security update
Notes
Topic
An update for qemu-kvm-rhev is now available for Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager.
Security Fix(es):
* An out-of-bounds read/write access flaw was found in the way QEMU's VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations via I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host's QEMU process. (CVE-2016-3710)
Red Hat would like to thank Wei Xiao (360 Marvel Team) and Qinghao Tang (360 Marvel Team) for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for qemu-kvm-rhev is now available for Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager.\n\nSecurity Fix(es):\n\n* An out-of-bounds read/write access flaw was found in the way QEMU\u0027s VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations via I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host\u0027s QEMU process. (CVE-2016-3710)\n\nRed Hat would like to thank Wei Xiao (360 Marvel Team) and Qinghao Tang (360 Marvel Team) for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1019", "url": "https://access.redhat.com/errata/RHSA-2016:1019" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1331401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331401" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1019.json" } ], "title": "Red Hat Security Advisory: qemu-kvm-rhev security update", "tracking": { "current_release_date": "2025-08-02T01:35:40+00:00", "generator": { "date": "2025-08-02T01:35:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:1019", "initial_release_date": "2016-05-11T01:01:33+00:00", "revision_history": [ { "date": "2016-05-11T01:01:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-05-11T01:01:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:35:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:5::el6" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "qemu-img-rhev-2:0.12.1.2-2.491.el6_8.1.x86_64", "product": { "name": "qemu-img-rhev-2:0.12.1.2-2.491.el6_8.1.x86_64", "product_id": "qemu-img-rhev-2:0.12.1.2-2.491.el6_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img-rhev@0.12.1.2-2.491.el6_8.1?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "product": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "product_id": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@0.12.1.2-2.491.el6_8.1?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.491.el6_8.1.x86_64", "product": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.491.el6_8.1.x86_64", "product_id": "qemu-kvm-rhev-tools-2:0.12.1.2-2.491.el6_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-tools@0.12.1.2-2.491.el6_8.1?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.491.el6_8.1.x86_64", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.491.el6_8.1.x86_64", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.491.el6_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.491.el6_8.1?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.491.el6_8.1.src", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.491.el6_8.1.src", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.491.el6_8.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.491.el6_8.1?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-img-rhev-2:0.12.1.2-2.491.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:qemu-img-rhev-2:0.12.1.2-2.491.el6_8.1.x86_64" }, "product_reference": "qemu-img-rhev-2:0.12.1.2-2.491.el6_8.1.x86_64", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.491.el6_8.1.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.491.el6_8.1.src" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.491.el6_8.1.src", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.491.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.491.el6_8.1.x86_64" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.491.el6_8.1.x86_64", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64" }, "product_reference": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.491.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-tools-2:0.12.1.2-2.491.el6_8.1.x86_64" }, "product_reference": "qemu-kvm-rhev-tools-2:0.12.1.2-2.491.el6_8.1.x86_64", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Qinghao Tang", "Wei Xiao" ], "organization": "360.cn Marvel Team" } ], "cve": "CVE-2016-3710", "discovery_date": "2016-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331401" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read/write access flaw was found in the way QEMU\u0027s VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations using I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host\u0027s QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: incorrect banked access bounds checking in vga module", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RH6-RHOS-5.0:qemu-img-rhev-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.491.el6_8.1.src", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-tools-2:0.12.1.2-2.491.el6_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3710" }, { "category": "external", "summary": "RHBZ#1331401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331401" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3710", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3710" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3710", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3710" } ], "release_date": "2016-05-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-11T01:01:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.", "product_ids": [ "6Server-RH6-RHOS-5.0:qemu-img-rhev-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.491.el6_8.1.src", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-tools-2:0.12.1.2-2.491.el6_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1019" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-RH6-RHOS-5.0:qemu-img-rhev-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.491.el6_8.1.src", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.491.el6_8.1.x86_64", "6Server-RH6-RHOS-5.0:qemu-kvm-rhev-tools-2:0.12.1.2-2.491.el6_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: incorrect banked access bounds checking in vga module" } ] }
rhsa-2016:1000
Vulnerability from csaf_redhat
Published
2016-05-10 05:04
Modified
2025-08-02 01:35
Summary
Red Hat Security Advisory: qemu-kvm-rhev security update
Notes
Topic
An update for qemu-kvm-rhev is now available for Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager.
Security Fix(es):
* An out-of-bounds read/write access flaw was found in the way QEMU's VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations via I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host's QEMU process. (CVE-2016-3710)
Red Hat would like to thank Wei Xiao (360 Marvel Team) and Qinghao Tang (360 Marvel Team) for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for qemu-kvm-rhev is now available for Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager.\n\nSecurity Fix(es):\n\n* An out-of-bounds read/write access flaw was found in the way QEMU\u0027s VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations via I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host\u0027s QEMU process. (CVE-2016-3710)\n\nRed Hat would like to thank Wei Xiao (360 Marvel Team) and Qinghao Tang (360 Marvel Team) for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1000", "url": "https://access.redhat.com/errata/RHSA-2016:1000" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1331401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331401" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1000.json" } ], "title": "Red Hat Security Advisory: qemu-kvm-rhev security update", "tracking": { "current_release_date": "2025-08-02T01:35:49+00:00", "generator": { "date": "2025-08-02T01:35:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:1000", "initial_release_date": "2016-05-10T05:04:35+00:00", "revision_history": [ { "date": "2016-05-10T05:04:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-05-10T05:04:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:35:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:6::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "product_id": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard-devel-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } }, { "category": "product_version", "name": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product": { "name": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_id": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcacard-tools-rhev@2.3.0-31.el7_2.13?arch=x86_64\u0026epoch=10" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "product": { "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "product_id": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.3.0-31.el7_2.13?arch=src\u0026epoch=10" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src" }, "product_reference": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64" }, "product_reference": "qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Qinghao Tang", "Wei Xiao" ], "organization": "360.cn Marvel Team" } ], "cve": "CVE-2016-3710", "discovery_date": "2016-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331401" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read/write access flaw was found in the way QEMU\u0027s VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations using I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host\u0027s QEMU process.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: incorrect banked access bounds checking in vga module", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-6.0:libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-6.0:libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-6.0:libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-6.0:qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-6.0:qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-6.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "7Server-RH7-RHOS-6.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-6.0:qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-6.0:qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3710" }, { "category": "external", "summary": "RHBZ#1331401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331401" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3710", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3710" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3710", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3710" } ], "release_date": "2016-05-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-10T05:04:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.", "product_ids": [ "7Server-RH7-RHOS-6.0:libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-6.0:libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-6.0:libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-6.0:qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-6.0:qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-6.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "7Server-RH7-RHOS-6.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-6.0:qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-6.0:qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1000" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-6.0:libcacard-devel-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-6.0:libcacard-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-6.0:libcacard-tools-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-6.0:qemu-img-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-6.0:qemu-kvm-common-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-6.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.src", "7Server-RH7-RHOS-6.0:qemu-kvm-rhev-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-6.0:qemu-kvm-rhev-debuginfo-10:2.3.0-31.el7_2.13.x86_64", "7Server-RH7-RHOS-6.0:qemu-kvm-tools-rhev-10:2.3.0-31.el7_2.13.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: incorrect banked access bounds checking in vga module" } ] }
fkie_cve-2016-3710
Vulnerability from fkie_nvd
Published
2016-05-11 21:59
Modified
2025-04-12 10:46
Severity ?
Summary
The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2016-0724.html | Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2016-0725.html | Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2016-0997.html | Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2016-0999.html | Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2016-1000.html | Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2016-1001.html | Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2016-1002.html | Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2016-1019.html | Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2016-1943.html | Third Party Advisory | |
secalert@redhat.com | http://support.citrix.com/article/CTX212736 | Third Party Advisory | |
secalert@redhat.com | http://www.debian.org/security/2016/dsa-3573 | Third Party Advisory | |
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2016/05/09/3 | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html | Third Party Advisory | |
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html | Third Party Advisory | |
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html | Third Party Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/90316 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.securitytracker.com/id/1035794 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.ubuntu.com/usn/USN-2974-1 | Third Party Advisory | |
secalert@redhat.com | http://xenbits.xen.org/xsa/advisory-179.html | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2016:1224 | Third Party Advisory | |
secalert@redhat.com | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862 | Third Party Advisory, Vendor Advisory | |
secalert@redhat.com | https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01197.html | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-0724.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-0725.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-0997.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-0999.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-1000.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-1001.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-1002.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-1019.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-1943.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.citrix.com/article/CTX212736 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2016/dsa-3573 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/05/09/3 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/90316 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1035794 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2974-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://xenbits.xen.org/xsa/advisory-179.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2016:1224 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862 | Third Party Advisory, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01197.html | Mailing List, Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
debian | debian_linux | 8.0 | |
hp | helion_openstack | 2.0.0 | |
hp | helion_openstack | 2.1.0 | |
hp | helion_openstack | 2.1.2 | |
hp | helion_openstack | 2.1.4 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 15.10 | |
canonical | ubuntu_linux | 16.04 | |
qemu | qemu | * | |
qemu | qemu | 2.6.0 | |
qemu | qemu | 2.6.0 | |
qemu | qemu | 2.6.0 | |
qemu | qemu | 2.6.0 | |
qemu | qemu | 2.6.0 | |
oracle | vm_server | 3.2 | |
oracle | vm_server | 3.3 | |
oracle | vm_server | 3.4 | |
oracle | linux | 5 | |
oracle | linux | 6 | |
oracle | linux | 7 | |
citrix | xenserver | * | |
redhat | openstack | 5.0 | |
redhat | openstack | 6.0 | |
redhat | openstack | 7.0 | |
redhat | openstack | 8 | |
redhat | virtualization | 3.0 | |
redhat | enterprise_linux_desktop | 6.0 | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 6.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_server_aus | 7.2 | |
redhat | enterprise_linux_server_aus | 7.3 | |
redhat | enterprise_linux_server_aus | 7.4 | |
redhat | enterprise_linux_server_aus | 7.6 | |
redhat | enterprise_linux_server_eus | 7.2 | |
redhat | enterprise_linux_server_eus | 7.3 | |
redhat | enterprise_linux_server_eus | 7.4 | |
redhat | enterprise_linux_server_eus | 7.5 | |
redhat | enterprise_linux_server_eus | 7.6 | |
redhat | enterprise_linux_server_eus | 7.7 | |
redhat | enterprise_linux_server_tus | 7.2 | |
redhat | enterprise_linux_server_tus | 7.3 | |
redhat | enterprise_linux_server_tus | 7.6 | |
redhat | enterprise_linux_server_tus | 7.7 | |
redhat | enterprise_linux_workstation | 6.0 | |
redhat | enterprise_linux_workstation | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:helion_openstack:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "46D566AF-D1DE-4EAD-B881-DC40D1DE780C", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:helion_openstack:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "81BED703-422A-4937-8BF0-F83C248188F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:helion_openstack:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "A241BABC-E6A8-43B1-BED6-77FC38E337BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:helion_openstack:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "DBE8AEFE-C74B-4E24-8EBA-35207DE756E3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "matchCriteriaId": "26A04769-0D4E-4B7B-B54C-C686FB69D85A", "versionEndIncluding": "2.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:qemu:qemu:2.6.0:rc0:*:*:*:*:*:*", "matchCriteriaId": "544B3E62-7AE7-4925-9E50-CAFDAD5A3851", "vulnerable": true }, { "criteria": "cpe:2.3:a:qemu:qemu:2.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B8C11472-2B2A-4110-A04B-5CFBA0763432", "vulnerable": true }, { "criteria": "cpe:2.3:a:qemu:qemu:2.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "ECD3B63B-1388-4C24-B9B9-043C04FE1F1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:qemu:qemu:2.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "B10C154A-F559-4BE1-94AE-8619D4634564", "vulnerable": true }, { "criteria": "cpe:2.3:a:qemu:qemu:2.6.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "F7126355-4164-4E54-BCC3-D3D6D1E5AF81", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:vm_server:3.2:*:*:*:*:*:x86:*", "matchCriteriaId": "FC9E8528-0FB8-4BF0-A9EF-6CC84A2631A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:vm_server:3.3:*:*:*:*:*:x86:*", "matchCriteriaId": "8663D0AF-825D-48FC-8AED-498434A0AA76", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:vm_server:3.4:*:*:*:*:*:x86:*", "matchCriteriaId": "457955E5-41E5-4E17-8435-AA0F6F757A21", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*", "matchCriteriaId": "62A2AC02-A933-4E51-810E-5D040B476B7B", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*", "matchCriteriaId": "D7B037A8-72A6-4DFF-94B2-D688A5F6F876", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*", "matchCriteriaId": "44B8FEDF-6CB0-46E9-9AD7-4445B001C158", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE91B02A-0F07-437D-8AFC-38541C5A04AD", "versionEndIncluding": "7.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B152EDF3-3140-4343-802F-F4F1C329F5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "31EC146C-A6F6-4C0D-AF87-685286262DAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "9DAA72A4-AC7D-4544-89D4-5B07961D5A95", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*", "matchCriteriaId": "E8B8C725-34CF-4340-BE7B-37E58CF706D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D86166F9-BBF0-4650-8CCD-0F9C97104D21", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C8D871B-AEA1-4407-AEE3-47EC782250FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "44B067C7-735E-43C9-9188-7E1522A02491", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "A8442C20-41F9-47FD-9A12-E724D3A31FD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "BF77CDCF-B9C9-427D-B2BF-36650FB2148C", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "21690BAC-2129-4A33-9B48-1F3BF30072A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6755B6AD-0422-467B-8115-34A60B1D1A40", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "17F256A9-D3B9-4C72-B013-4EFD878BFEA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \"Dark Portal\" issue." }, { "lang": "es", "value": "El m\u00f3dulo VGA en QEMU lleva a cabo incorrectamente comprobaciones de l\u00edmites sobre acceso almacenado a la memoria de v\u00eddeo, lo que permite a administradores locales de SO invitado ejecutar c\u00f3digo arbitrario sobre el anfitri\u00f3n cambiando los modos de acceso despu\u00e9s de establecer el banco de registros, tambi\u00e9n conocido como el problema \"Dark Portal\"." } ], "id": "CVE-2016-3710", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-05-11T21:59:01.077", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0724.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0725.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0997.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0999.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1000.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1001.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1002.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1019.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1943.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://support.citrix.com/article/CTX212736" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3573" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/05/09/3" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/90316" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1035794" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2974-1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-179.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2016:1224" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "Vendor Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01197.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0724.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0725.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0997.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0999.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1943.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.citrix.com/article/CTX212736" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3573" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/05/09/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/90316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1035794" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2974-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-179.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2016:1224" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "Vendor Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01197.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2016-3710
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2016-3710", "description": "The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \"Dark Portal\" issue.", "id": "GSD-2016-3710", "references": [ "https://www.suse.com/security/cve/CVE-2016-3710.html", "https://www.debian.org/security/2016/dsa-3573", "https://access.redhat.com/errata/RHSA-2016:1943", "https://access.redhat.com/errata/RHSA-2016:1224", "https://access.redhat.com/errata/RHSA-2016:1019", "https://access.redhat.com/errata/RHSA-2016:1002", "https://access.redhat.com/errata/RHSA-2016:1001", "https://access.redhat.com/errata/RHSA-2016:1000", "https://access.redhat.com/errata/RHSA-2016:0999", "https://access.redhat.com/errata/RHSA-2016:0997", "https://access.redhat.com/errata/RHSA-2016:0725", "https://access.redhat.com/errata/RHSA-2016:0724", "https://ubuntu.com/security/CVE-2016-3710", "https://advisories.mageia.org/CVE-2016-3710.html", "https://linux.oracle.com/cve/CVE-2016-3710.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-3710" ], "details": "The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \"Dark Portal\" issue.", "id": "GSD-2016-3710", "modified": "2023-12-13T01:21:27.711811Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-3710", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \"Dark Portal\" issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.ubuntu.com/usn/USN-2974-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-2974-1" }, { "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "refsource": "MISC", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "refsource": "MISC", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html", "refsource": "MISC", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2016-0724.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2016-0724.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2016-0725.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2016-0725.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2016-0997.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2016-0997.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2016-0999.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2016-0999.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2016-1000.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2016-1000.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2016-1001.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2016-1001.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2016-1002.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2016-1002.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2016-1019.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2016-1019.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2016-1943.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2016-1943.html" }, { "name": "http://support.citrix.com/article/CTX212736", "refsource": "MISC", "url": "http://support.citrix.com/article/CTX212736" }, { "name": "http://www.debian.org/security/2016/dsa-3573", "refsource": "MISC", "url": "http://www.debian.org/security/2016/dsa-3573" }, { "name": "http://www.openwall.com/lists/oss-security/2016/05/09/3", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2016/05/09/3" }, { "name": "http://www.securityfocus.com/bid/90316", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/90316" }, { "name": "http://www.securitytracker.com/id/1035794", "refsource": "MISC", "url": "http://www.securitytracker.com/id/1035794" }, { "name": "http://xenbits.xen.org/xsa/advisory-179.html", "refsource": "MISC", "url": "http://xenbits.xen.org/xsa/advisory-179.html" }, { "name": "https://access.redhat.com/errata/RHSA-2016:1224", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2016:1224" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862", "refsource": "MISC", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862" }, { "name": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01197.html", "refsource": "MISC", "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01197.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:hp:helion_openstack:2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:helion_openstack:2.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:helion_openstack:2.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:helion_openstack:2.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.5.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qemu:qemu:2.6.0:rc0:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qemu:qemu:2.6.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qemu:qemu:2.6.0:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qemu:qemu:2.6.0:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qemu:qemu:2.6.0:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:vm_server:3.2:*:*:*:*:*:x86:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:vm_server:3.3:*:*:*:*:*:x86:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:vm_server:3.4:*:*:*:*:*:x86:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-3710" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \"Dark Portal\" issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20160509 CVE-2016-3710 Qemu: vga: out-of-bounds r/w access issue", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/05/09/3" }, { "name": "[Qemu-devel] 20160509 [PULL 1/5] vga: fix banked access bounds checking (CVE-2016-3710)", "refsource": "MLIST", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01197.html" }, { "name": "http://xenbits.xen.org/xsa/advisory-179.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-179.html" }, { "name": "1035794", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1035794" }, { "name": "DSA-3573", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3573" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862", "refsource": "CONFIRM", "tags": [ "Third Party Advisory", "Vendor Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862" }, { "name": "USN-2974-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2974-1" }, { "name": "RHSA-2016:1019", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1019.html" }, { "name": "RHSA-2016:1224", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2016:1224" }, { "name": "RHSA-2016:1002", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1002.html" }, { "name": "RHSA-2016:1001", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1001.html" }, { "name": "RHSA-2016:0725", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0725.html" }, { "name": "RHSA-2016:0999", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0999.html" }, { "name": "RHSA-2016:1000", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1000.html" }, { "name": "RHSA-2016:0724", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0724.html" }, { "name": "RHSA-2016:0997", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0997.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html" }, { "name": "90316", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/90316" }, { "name": "http://support.citrix.com/article/CTX212736", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://support.citrix.com/article/CTX212736" }, { "name": "RHSA-2016:1943", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1943.html" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0 } }, "lastModifiedDate": "2021-08-04T17:15Z", "publishedDate": "2016-05-11T21:59Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…