suse-su-2016:2628-1
Vulnerability from csaf_suse
Published
2016-10-25 14:22
Modified
2016-10-25 14:22
Summary
Security update for kvm

Notes

Title of the patch
Security update for kvm
Description of the patch
kvm was updated to fix 16 security issues. These security issues were fixed: - CVE-2015-6815: e1000 NIC emulation support was vulnerable to an infinite loop issue. A privileged user inside guest could have used this flaw to crash the Qemu instance resulting in DoS. (bsc#944697). - CVE-2016-2391: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers (bsc#967013). - CVE-2016-2392: The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU did not properly validate USB configuration descriptor objects, which allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet (bsc#967012). - CVE-2016-4453: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982223). - CVE-2016-4454: The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read (bsc#982222). - CVE-2016-5105: The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, used an uninitialized variable, which allowed local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982017). - CVE-2016-5106: The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982018). - CVE-2016-5107: The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors (bsc#982019). - CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982285). - CVE-2016-5238: The get_cmd function in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982959). - CVE-2016-5337: The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983961). - CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer (bsc#983982). - CVE-2016-5403: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion (bsc#991080). - CVE-2016-6490: Infinite loop in the virtio framework. A privileged user inside the guest could have used this flaw to crash the Qemu instance on the host resulting in DoS (bsc#991466). - CVE-2016-7116: Host directory sharing via Plan 9 File System(9pfs) was vulnerable to a directory/path traversal issue. A privileged user inside guest could have used this flaw to access undue files on the host (bsc#996441). - CVE-2014-7815: The set_pixel_format function in ui/vnc.c in QEMU allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#902737).
Patchnames
slessp4-kvm-12816
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for kvm",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "kvm was updated to fix 16 security issues.\n\nThese security issues were fixed:\n- CVE-2015-6815: e1000 NIC emulation support was vulnerable to an infinite loop issue. A privileged user inside guest could have used this flaw to crash the Qemu instance resulting in DoS.  (bsc#944697).\n- CVE-2016-2391: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers (bsc#967013).\n- CVE-2016-2392: The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU did not properly validate USB configuration descriptor objects, which allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet (bsc#967012).\n- CVE-2016-4453: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982223).\n- CVE-2016-4454: The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read (bsc#982222).\n- CVE-2016-5105: The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, used an uninitialized variable, which allowed local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982017).\n- CVE-2016-5106: The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982018).\n- CVE-2016-5107: The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors (bsc#982019).\n- CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982285).\n- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982959).\n- CVE-2016-5337: The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983961).\n- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer (bsc#983982).\n- CVE-2016-5403: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion (bsc#991080).\n- CVE-2016-6490: Infinite loop in the virtio framework. A privileged user inside the guest could have used this flaw to crash the Qemu instance on the host resulting in DoS (bsc#991466).\n- CVE-2016-7116: Host directory sharing via Plan 9 File System(9pfs) was vulnerable to a directory/path traversal issue. A privileged user inside guest could have used this flaw to access undue files on the host (bsc#996441).\n- CVE-2014-7815: The set_pixel_format function in ui/vnc.c in QEMU allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#902737).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "slessp4-kvm-12816",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2628-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2016:2628-1",
        "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162628-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2016:2628-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 902737",
        "url": "https://bugzilla.suse.com/902737"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 944697",
        "url": "https://bugzilla.suse.com/944697"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 967012",
        "url": "https://bugzilla.suse.com/967012"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 967013",
        "url": "https://bugzilla.suse.com/967013"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 982017",
        "url": "https://bugzilla.suse.com/982017"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 982018",
        "url": "https://bugzilla.suse.com/982018"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 982019",
        "url": "https://bugzilla.suse.com/982019"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 982222",
        "url": "https://bugzilla.suse.com/982222"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 982223",
        "url": "https://bugzilla.suse.com/982223"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 982285",
        "url": "https://bugzilla.suse.com/982285"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 982959",
        "url": "https://bugzilla.suse.com/982959"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 983961",
        "url": "https://bugzilla.suse.com/983961"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 983982",
        "url": "https://bugzilla.suse.com/983982"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 991080",
        "url": "https://bugzilla.suse.com/991080"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 991466",
        "url": "https://bugzilla.suse.com/991466"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 996441",
        "url": "https://bugzilla.suse.com/996441"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-7815 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-7815/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-6815 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-6815/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-2391 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-2391/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-2392 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-2392/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-4453 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-4453/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-4454 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-4454/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-5105 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-5105/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-5106 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-5106/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-5107 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-5107/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-5126 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-5126/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-5238 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-5238/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-5337 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-5337/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-5338 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-5338/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-5403 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-5403/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-6490 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-6490/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-7116 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-7116/"
      }
    ],
    "title": "Security update for kvm",
    "tracking": {
      "current_release_date": "2016-10-25T14:22:27Z",
      "generator": {
        "date": "2016-10-25T14:22:27Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2016:2628-1",
      "initial_release_date": "2016-10-25T14:22:27Z",
      "revision_history": [
        {
          "date": "2016-10-25T14:22:27Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kvm-1.4.2-47.1.i586",
                "product": {
                  "name": "kvm-1.4.2-47.1.i586",
                  "product_id": "kvm-1.4.2-47.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kvm-1.4.2-47.1.s390x",
                "product": {
                  "name": "kvm-1.4.2-47.1.s390x",
                  "product_id": "kvm-1.4.2-47.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kvm-1.4.2-47.1.x86_64",
                "product": {
                  "name": "kvm-1.4.2-47.1.x86_64",
                  "product_id": "kvm-1.4.2-47.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 11 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Server 11 SP4",
                  "product_id": "SUSE Linux Enterprise Server 11 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse_sles:11:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:11:sp4"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kvm-1.4.2-47.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586"
        },
        "product_reference": "kvm-1.4.2-47.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kvm-1.4.2-47.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x"
        },
        "product_reference": "kvm-1.4.2-47.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kvm-1.4.2-47.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64"
        },
        "product_reference": "kvm-1.4.2-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kvm-1.4.2-47.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586"
        },
        "product_reference": "kvm-1.4.2-47.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kvm-1.4.2-47.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x"
        },
        "product_reference": "kvm-1.4.2-47.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kvm-1.4.2-47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
        },
        "product_reference": "kvm-1.4.2-47.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2014-7815",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-7815"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The set_pixel_format function in ui/vnc.c in QEMU allows remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-7815",
          "url": "https://www.suse.com/security/cve/CVE-2014-7815"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 902737 for CVE-2014-7815",
          "url": "https://bugzilla.suse.com/902737"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 962627 for CVE-2014-7815",
          "url": "https://bugzilla.suse.com/962627"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-10-25T14:22:27Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-7815"
    },
    {
      "cve": "CVE-2015-6815",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-6815"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-6815",
          "url": "https://www.suse.com/security/cve/CVE-2015-6815"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 944697 for CVE-2015-6815",
          "url": "https://bugzilla.suse.com/944697"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 950367 for CVE-2015-6815",
          "url": "https://bugzilla.suse.com/950367"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-10-25T14:22:27Z",
          "details": "low"
        }
      ],
      "title": "CVE-2015-6815"
    },
    {
      "cve": "CVE-2016-2391",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-2391"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-2391",
          "url": "https://www.suse.com/security/cve/CVE-2016-2391"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 967012 for CVE-2016-2391",
          "url": "https://bugzilla.suse.com/967012"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 967013 for CVE-2016-2391",
          "url": "https://bugzilla.suse.com/967013"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 967101 for CVE-2016-2391",
          "url": "https://bugzilla.suse.com/967101"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-10-25T14:22:27Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-2391"
    },
    {
      "cve": "CVE-2016-2392",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-2392"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 does not properly validate USB configuration descriptor objects, which allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-2392",
          "url": "https://www.suse.com/security/cve/CVE-2016-2392"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 967012 for CVE-2016-2392",
          "url": "https://bugzilla.suse.com/967012"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 967090 for CVE-2016-2392",
          "url": "https://bugzilla.suse.com/967090"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-10-25T14:22:27Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-2392"
    },
    {
      "cve": "CVE-2016-4453",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-4453"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-4453",
          "url": "https://www.suse.com/security/cve/CVE-2016-4453"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 982223 for CVE-2016-4453",
          "url": "https://bugzilla.suse.com/982223"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 982225 for CVE-2016-4453",
          "url": "https://bugzilla.suse.com/982225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-10-25T14:22:27Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-4453"
    },
    {
      "cve": "CVE-2016-4454",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-4454"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-4454",
          "url": "https://www.suse.com/security/cve/CVE-2016-4454"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 982222 for CVE-2016-4454",
          "url": "https://bugzilla.suse.com/982222"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 982224 for CVE-2016-4454",
          "url": "https://bugzilla.suse.com/982224"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-10-25T14:22:27Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-4454"
    },
    {
      "cve": "CVE-2016-5105",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-5105"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, uses an uninitialized variable, which allows local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-5105",
          "url": "https://www.suse.com/security/cve/CVE-2016-5105"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 982017 for CVE-2016-5105",
          "url": "https://bugzilla.suse.com/982017"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 982024 for CVE-2016-5105",
          "url": "https://bugzilla.suse.com/982024"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-10-25T14:22:27Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-5105"
    },
    {
      "cve": "CVE-2016-5106",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-5106"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-5106",
          "url": "https://www.suse.com/security/cve/CVE-2016-5106"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 982018 for CVE-2016-5106",
          "url": "https://bugzilla.suse.com/982018"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 982025 for CVE-2016-5106",
          "url": "https://bugzilla.suse.com/982025"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-10-25T14:22:27Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-5106"
    },
    {
      "cve": "CVE-2016-5107",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-5107"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-5107",
          "url": "https://www.suse.com/security/cve/CVE-2016-5107"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 982019 for CVE-2016-5107",
          "url": "https://bugzilla.suse.com/982019"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 982026 for CVE-2016-5107",
          "url": "https://bugzilla.suse.com/982026"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-10-25T14:22:27Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-5107"
    },
    {
      "cve": "CVE-2016-5126",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-5126"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-5126",
          "url": "https://www.suse.com/security/cve/CVE-2016-5126"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 982285 for CVE-2016-5126",
          "url": "https://bugzilla.suse.com/982285"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 982286 for CVE-2016-5126",
          "url": "https://bugzilla.suse.com/982286"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-10-25T14:22:27Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-5126"
    },
    {
      "cve": "CVE-2016-5238",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-5238"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The get_cmd function in hw/scsi/esp.c in QEMU might allow local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-5238",
          "url": "https://www.suse.com/security/cve/CVE-2016-5238"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 982959 for CVE-2016-5238",
          "url": "https://bugzilla.suse.com/982959"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 982960 for CVE-2016-5238",
          "url": "https://bugzilla.suse.com/982960"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-10-25T14:22:27Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2016-5238"
    },
    {
      "cve": "CVE-2016-5337",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-5337"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-5337",
          "url": "https://www.suse.com/security/cve/CVE-2016-5337"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 983961 for CVE-2016-5337",
          "url": "https://bugzilla.suse.com/983961"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 983973 for CVE-2016-5337",
          "url": "https://bugzilla.suse.com/983973"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-10-25T14:22:27Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-5337"
    },
    {
      "cve": "CVE-2016-5338",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-5338"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-5338",
          "url": "https://www.suse.com/security/cve/CVE-2016-5338"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 983982 for CVE-2016-5338",
          "url": "https://bugzilla.suse.com/983982"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 983984 for CVE-2016-5338",
          "url": "https://bugzilla.suse.com/983984"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-10-25T14:22:27Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-5338"
    },
    {
      "cve": "CVE-2016-5403",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-5403"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-5403",
          "url": "https://www.suse.com/security/cve/CVE-2016-5403"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 990923 for CVE-2016-5403",
          "url": "https://bugzilla.suse.com/990923"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 991080 for CVE-2016-5403",
          "url": "https://bugzilla.suse.com/991080"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-10-25T14:22:27Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-5403"
    },
    {
      "cve": "CVE-2016-6490",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-6490"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the descriptor buffer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-6490",
          "url": "https://www.suse.com/security/cve/CVE-2016-6490"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 991466 for CVE-2016-6490",
          "url": "https://bugzilla.suse.com/991466"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 993854 for CVE-2016-6490",
          "url": "https://bugzilla.suse.com/993854"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-10-25T14:22:27Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-6490"
    },
    {
      "cve": "CVE-2016-7116",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-7116"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-7116",
          "url": "https://www.suse.com/security/cve/CVE-2016-7116"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 996441 for CVE-2016-7116",
          "url": "https://bugzilla.suse.com/996441"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-10-25T14:22:27Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-7116"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…