Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-7116 (GCVE-0-2016-7116)
Vulnerability from cvelistv5 – Published: 2016-12-10 00:00 – Updated: 2024-08-06 01:50
VLAI?
EPSS
Summary
Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
Date Public ?
2016-08-26 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T01:50:47.488Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[qemu-devel] 20160826 [PATCH v2 0/5] 9P security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03917.html"
},
{
"name": "[oss-security] 20160830 Re: CVE request: Qemu: 9p: directory traversal flaw in 9p virtio backend",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2016/08/30/3"
},
{
"name": "92680",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/92680"
},
{
"name": "GLSA-201609-01",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201609-01"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=56f101ecce0eafd09e2daf1c4eeb1377d6959261"
},
{
"name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
},
{
"name": "[oss-security] 20160830 CVE request: Qemu: 9p: directory traversal flaw in 9p virtio backend",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2016/08/30/1"
},
{
"name": "[qemu-devel] 20160830 [PATCH v4 0/3] 9pfs security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04231.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-08-26T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-12-01T10:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "[qemu-devel] 20160826 [PATCH v2 0/5] 9P security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03917.html"
},
{
"name": "[oss-security] 20160830 Re: CVE request: Qemu: 9p: directory traversal flaw in 9p virtio backend",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2016/08/30/3"
},
{
"name": "92680",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/92680"
},
{
"name": "GLSA-201609-01",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201609-01"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=56f101ecce0eafd09e2daf1c4eeb1377d6959261"
},
{
"name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
},
{
"name": "[oss-security] 20160830 CVE request: Qemu: 9p: directory traversal flaw in 9p virtio backend",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2016/08/30/1"
},
{
"name": "[qemu-devel] 20160830 [PATCH v4 0/3] 9pfs security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04231.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2016-7116",
"datePublished": "2016-12-10T00:00:00.000Z",
"dateReserved": "2016-08-30T00:00:00.000Z",
"dateUpdated": "2024-08-06T01:50:47.488Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.6.2\", \"matchCriteriaId\": \"3CF78B06-34D3-4BF8-883B-7B9643BBA7CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qemu:qemu:2.7.0:rc0:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA78F261-DEB3-46D5-9998-106F6210755E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qemu:qemu:2.7.0:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"F121048B-9387-40C6-A919-7F9A4A847EA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qemu:qemu:2.7.0:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A102329-A5FB-4B9C-9094-BDA595807A56\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qemu:qemu:2.7.0:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"21153B03-A177-46BD-8197-3397C365D418\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qemu:qemu:2.7.0:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E7398D7-A9ED-4C75-A048-475EF4088E3B\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad de salto de directorio en hw/9pfs/9p.c en QEMU (tambi\\u00e9n conocido como Quick Emulator) permite a administradores locales del SO invitado acceder a los archivos del host fuera de la ruta de exportaci\\u00f3n a trav\\u00e9s de un .. (punto punto) en una cadena no especificada.\"}]",
"id": "CVE-2016-7116",
"lastModified": "2024-11-21T02:57:30.633",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N\", \"baseScore\": 6.0, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.5, \"impactScore\": 4.0}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 2.1, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 3.9, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2016-12-10T00:59:10.637",
"references": "[{\"url\": \"http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=56f101ecce0eafd09e2daf1c4eeb1377d6959261\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2016/08/30/1\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2016/08/30/3\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/92680\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03917.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04231.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201609-01\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=56f101ecce0eafd09e2daf1c4eeb1377d6959261\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2016/08/30/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2016/08/30/3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/92680\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03917.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04231.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201609-01\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2016-7116\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2016-12-10T00:59:10.637\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de salto de directorio en hw/9pfs/9p.c en QEMU (tambi\u00e9n conocido como Quick Emulator) permite a administradores locales del SO invitado acceder a los archivos del host fuera de la ruta de exportaci\u00f3n a trav\u00e9s de un .. (punto punto) en una cadena no especificada.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N\",\"baseScore\":6.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.5,\"impactScore\":4.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6.2\",\"matchCriteriaId\":\"3CF78B06-34D3-4BF8-883B-7B9643BBA7CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qemu:qemu:2.7.0:rc0:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA78F261-DEB3-46D5-9998-106F6210755E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qemu:qemu:2.7.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F121048B-9387-40C6-A919-7F9A4A847EA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qemu:qemu:2.7.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A102329-A5FB-4B9C-9094-BDA595807A56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qemu:qemu:2.7.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"21153B03-A177-46BD-8197-3397C365D418\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qemu:qemu:2.7.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E7398D7-A9ED-4C75-A048-475EF4088E3B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}],\"references\":[{\"url\":\"http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=56f101ecce0eafd09e2daf1c4eeb1377d6959261\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/08/30/1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/08/30/3\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/92680\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03917.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04231.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201609-01\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=56f101ecce0eafd09e2daf1c4eeb1377d6959261\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/08/30/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/08/30/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/92680\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03917.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04231.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201609-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
SUSE-SU-2016:2589-1
Vulnerability from csaf_suse - Published: 2016-10-21 13:19 - Updated: 2016-10-21 13:19Summary
Security update for qemu
Severity
Important
Notes
Title of the patch: Security update for qemu
Description of the patch: qemu was updated to fix 19 security issues.
These security issues were fixed:
- CVE-2016-2392: The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU did not properly validate USB configuration descriptor objects, which allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet (bsc#967012)
- CVE-2016-2391: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers (bsc#967013)
- CVE-2016-5106: The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982018)
- CVE-2016-5105: The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, used an uninitialized variable, which allowed local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982017)
- CVE-2016-5107: The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors (bsc#982019)
- CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982285)
- CVE-2016-4454: The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read (bsc#982222)
- CVE-2016-4453: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982223)
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer (bsc#983982)
- CVE-2016-5337: The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983961)
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982959)
- CVE-2016-5403: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion (bsc#991080)
- CVE-2016-6490: Infinite loop in the virtio framework. A privileged user inside the guest could have used this flaw to crash the Qemu instance on the host resulting in DoS (bsc#991466)
- CVE-2016-6888: Integer overflow in packet initialisation in VMXNET3 device driver. A privileged user inside guest could have used this flaw to crash the Qemu instance resulting in DoS (bsc#994771)
- CVE-2016-6833: Use-after-free issue in the VMWARE VMXNET3 NIC device support. A privileged user inside guest could have used this issue to crash the Qemu instance resulting in DoS (bsc#994774)
- CVE-2016-7116: Host directory sharing via Plan 9 File System(9pfs) was vulnerable to a directory/path traversal issue. A privileged user inside guest could have used this flaw to access undue files on the host (bsc#996441)
- CVE-2016-6836: VMWARE VMXNET3 NIC device support was leaging information leakage. A privileged user inside guest could have used this to leak host memory bytes to a guest (bsc#994760)
- CVE-2016-7155: In the VMWARE PVSCSI paravirtual SCSI bus a OOB access and/or infinite loop issue could have allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#997858)
- CVE-2016-7156: In the VMWARE PVSCSI paravirtual SCSI bus a infinite loop issue could have allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#997859)
This non-security issue was fixed:
- bsc#1000048: Fix migration failure where target host is a soon to be released SLES 12 SP2. Qemu's spice code gets an assertion.
Patchnames: SUSE-SLE-DESKTOP-12-SP1-2016-1523,SUSE-SLE-SERVER-12-SP1-2016-1523
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "qemu was updated to fix 19 security issues.\n\nThese security issues were fixed:\n- CVE-2016-2392: The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU did not properly validate USB configuration descriptor objects, which allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet (bsc#967012)\n- CVE-2016-2391: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers (bsc#967013)\n- CVE-2016-5106: The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982018)\n- CVE-2016-5105: The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, used an uninitialized variable, which allowed local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982017)\n- CVE-2016-5107: The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors (bsc#982019)\n- CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982285)\n- CVE-2016-4454: The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read (bsc#982222)\n- CVE-2016-4453: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982223)\n- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer (bsc#983982)\n- CVE-2016-5337: The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983961)\n- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982959)\n- CVE-2016-5403: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion (bsc#991080)\n- CVE-2016-6490: Infinite loop in the virtio framework. A privileged user inside the guest could have used this flaw to crash the Qemu instance on the host resulting in DoS (bsc#991466)\n- CVE-2016-6888: Integer overflow in packet initialisation in VMXNET3 device driver. A privileged user inside guest could have used this flaw to crash the Qemu instance resulting in DoS (bsc#994771)\n- CVE-2016-6833: Use-after-free issue in the VMWARE VMXNET3 NIC device support. A privileged user inside guest could have used this issue to crash the Qemu instance resulting in DoS (bsc#994774)\n- CVE-2016-7116: Host directory sharing via Plan 9 File System(9pfs) was vulnerable to a directory/path traversal issue. A privileged user inside guest could have used this flaw to access undue files on the host (bsc#996441)\n- CVE-2016-6836: VMWARE VMXNET3 NIC device support was leaging information leakage. A privileged user inside guest could have used this to leak host memory bytes to a guest (bsc#994760)\n- CVE-2016-7155: In the VMWARE PVSCSI paravirtual SCSI bus a OOB access and/or infinite loop issue could have allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#997858)\n- CVE-2016-7156: In the VMWARE PVSCSI paravirtual SCSI bus a infinite loop issue could have allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#997859)\n\nThis non-security issue was fixed:\n- bsc#1000048: Fix migration failure where target host is a soon to be released SLES 12 SP2. Qemu\u0027s spice code gets an assertion.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP1-2016-1523,SUSE-SLE-SERVER-12-SP1-2016-1523",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2589-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:2589-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162589-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:2589-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002344.html"
},
{
"category": "self",
"summary": "SUSE Bug 1000048",
"url": "https://bugzilla.suse.com/1000048"
},
{
"category": "self",
"summary": "SUSE Bug 967012",
"url": "https://bugzilla.suse.com/967012"
},
{
"category": "self",
"summary": "SUSE Bug 967013",
"url": "https://bugzilla.suse.com/967013"
},
{
"category": "self",
"summary": "SUSE Bug 982017",
"url": "https://bugzilla.suse.com/982017"
},
{
"category": "self",
"summary": "SUSE Bug 982018",
"url": "https://bugzilla.suse.com/982018"
},
{
"category": "self",
"summary": "SUSE Bug 982019",
"url": "https://bugzilla.suse.com/982019"
},
{
"category": "self",
"summary": "SUSE Bug 982222",
"url": "https://bugzilla.suse.com/982222"
},
{
"category": "self",
"summary": "SUSE Bug 982223",
"url": "https://bugzilla.suse.com/982223"
},
{
"category": "self",
"summary": "SUSE Bug 982285",
"url": "https://bugzilla.suse.com/982285"
},
{
"category": "self",
"summary": "SUSE Bug 982959",
"url": "https://bugzilla.suse.com/982959"
},
{
"category": "self",
"summary": "SUSE Bug 983961",
"url": "https://bugzilla.suse.com/983961"
},
{
"category": "self",
"summary": "SUSE Bug 983982",
"url": "https://bugzilla.suse.com/983982"
},
{
"category": "self",
"summary": "SUSE Bug 991080",
"url": "https://bugzilla.suse.com/991080"
},
{
"category": "self",
"summary": "SUSE Bug 991466",
"url": "https://bugzilla.suse.com/991466"
},
{
"category": "self",
"summary": "SUSE Bug 994760",
"url": "https://bugzilla.suse.com/994760"
},
{
"category": "self",
"summary": "SUSE Bug 994771",
"url": "https://bugzilla.suse.com/994771"
},
{
"category": "self",
"summary": "SUSE Bug 994774",
"url": "https://bugzilla.suse.com/994774"
},
{
"category": "self",
"summary": "SUSE Bug 996441",
"url": "https://bugzilla.suse.com/996441"
},
{
"category": "self",
"summary": "SUSE Bug 997858",
"url": "https://bugzilla.suse.com/997858"
},
{
"category": "self",
"summary": "SUSE Bug 997859",
"url": "https://bugzilla.suse.com/997859"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2391 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2391/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2392 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2392/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4453 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4453/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4454 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4454/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5105 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5106 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5107 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5126 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5238 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5337 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5337/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5338 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5338/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5403 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5403/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6490 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6833 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6833/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6836 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6888 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6888/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7116 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7155 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7156 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7156/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2016-10-21T13:19:52Z",
"generator": {
"date": "2016-10-21T13:19:52Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:2589-1",
"initial_release_date": "2016-10-21T13:19:52Z",
"revision_history": [
{
"date": "2016-10-21T13:19:52Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0-21.1.noarch",
"product": {
"name": "qemu-ipxe-1.0.0-21.1.noarch",
"product_id": "qemu-ipxe-1.0.0-21.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.8.1-21.1.noarch",
"product": {
"name": "qemu-seabios-1.8.1-21.1.noarch",
"product_id": "qemu-seabios-1.8.1-21.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-21.1.noarch",
"product": {
"name": "qemu-sgabios-8-21.1.noarch",
"product_id": "qemu-sgabios-8-21.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.8.1-21.1.noarch",
"product": {
"name": "qemu-vgabios-1.8.1-21.1.noarch",
"product_id": "qemu-vgabios-1.8.1-21.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.3.1-21.1.ppc64le",
"product": {
"name": "qemu-2.3.1-21.1.ppc64le",
"product_id": "qemu-2.3.1-21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.3.1-21.1.ppc64le",
"product": {
"name": "qemu-block-curl-2.3.1-21.1.ppc64le",
"product_id": "qemu-block-curl-2.3.1-21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.3.1-21.1.ppc64le",
"product": {
"name": "qemu-guest-agent-2.3.1-21.1.ppc64le",
"product_id": "qemu-guest-agent-2.3.1-21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.3.1-21.1.ppc64le",
"product": {
"name": "qemu-lang-2.3.1-21.1.ppc64le",
"product_id": "qemu-lang-2.3.1-21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.3.1-21.1.ppc64le",
"product": {
"name": "qemu-ppc-2.3.1-21.1.ppc64le",
"product_id": "qemu-ppc-2.3.1-21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.3.1-21.1.ppc64le",
"product": {
"name": "qemu-tools-2.3.1-21.1.ppc64le",
"product_id": "qemu-tools-2.3.1-21.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.3.1-21.1.s390x",
"product": {
"name": "qemu-2.3.1-21.1.s390x",
"product_id": "qemu-2.3.1-21.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.3.1-21.1.s390x",
"product": {
"name": "qemu-block-curl-2.3.1-21.1.s390x",
"product_id": "qemu-block-curl-2.3.1-21.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.3.1-21.1.s390x",
"product": {
"name": "qemu-guest-agent-2.3.1-21.1.s390x",
"product_id": "qemu-guest-agent-2.3.1-21.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.3.1-21.1.s390x",
"product": {
"name": "qemu-kvm-2.3.1-21.1.s390x",
"product_id": "qemu-kvm-2.3.1-21.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.3.1-21.1.s390x",
"product": {
"name": "qemu-lang-2.3.1-21.1.s390x",
"product_id": "qemu-lang-2.3.1-21.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.3.1-21.1.s390x",
"product": {
"name": "qemu-s390-2.3.1-21.1.s390x",
"product_id": "qemu-s390-2.3.1-21.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.3.1-21.1.s390x",
"product": {
"name": "qemu-tools-2.3.1-21.1.s390x",
"product_id": "qemu-tools-2.3.1-21.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.3.1-21.1.x86_64",
"product": {
"name": "qemu-2.3.1-21.1.x86_64",
"product_id": "qemu-2.3.1-21.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.3.1-21.1.x86_64",
"product": {
"name": "qemu-block-curl-2.3.1-21.1.x86_64",
"product_id": "qemu-block-curl-2.3.1-21.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.3.1-21.1.x86_64",
"product": {
"name": "qemu-kvm-2.3.1-21.1.x86_64",
"product_id": "qemu-kvm-2.3.1-21.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.3.1-21.1.x86_64",
"product": {
"name": "qemu-tools-2.3.1-21.1.x86_64",
"product_id": "qemu-tools-2.3.1-21.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.3.1-21.1.x86_64",
"product": {
"name": "qemu-x86-2.3.1-21.1.x86_64",
"product_id": "qemu-x86-2.3.1-21.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.3.1-21.1.x86_64",
"product": {
"name": "qemu-block-rbd-2.3.1-21.1.x86_64",
"product_id": "qemu-block-rbd-2.3.1-21.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.3.1-21.1.x86_64",
"product": {
"name": "qemu-guest-agent-2.3.1-21.1.x86_64",
"product_id": "qemu-guest-agent-2.3.1-21.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.3.1-21.1.x86_64",
"product": {
"name": "qemu-lang-2.3.1-21.1.x86_64",
"product_id": "qemu-lang-2.3.1-21.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-21.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64"
},
"product_reference": "qemu-2.3.1-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-21.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64"
},
"product_reference": "qemu-block-curl-2.3.1-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-21.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-21.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.3.1-21.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64"
},
"product_reference": "qemu-kvm-2.3.1-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.8.1-21.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch"
},
"product_reference": "qemu-seabios-1.8.1-21.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-21.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch"
},
"product_reference": "qemu-sgabios-8-21.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-21.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64"
},
"product_reference": "qemu-tools-2.3.1-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.8.1-21.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch"
},
"product_reference": "qemu-vgabios-1.8.1-21.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.3.1-21.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
},
"product_reference": "qemu-x86-2.3.1-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-21.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le"
},
"product_reference": "qemu-2.3.1-21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-21.1.s390x as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x"
},
"product_reference": "qemu-2.3.1-21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-21.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64"
},
"product_reference": "qemu-2.3.1-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-21.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le"
},
"product_reference": "qemu-block-curl-2.3.1-21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-21.1.s390x as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x"
},
"product_reference": "qemu-block-curl-2.3.1-21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-21.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64"
},
"product_reference": "qemu-block-curl-2.3.1-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.3.1-21.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.3.1-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-21.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le"
},
"product_reference": "qemu-guest-agent-2.3.1-21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-21.1.s390x as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x"
},
"product_reference": "qemu-guest-agent-2.3.1-21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-21.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.3.1-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-21.1.noarch as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-21.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.3.1-21.1.s390x as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x"
},
"product_reference": "qemu-kvm-2.3.1-21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.3.1-21.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64"
},
"product_reference": "qemu-kvm-2.3.1-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-21.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le"
},
"product_reference": "qemu-lang-2.3.1-21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-21.1.s390x as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x"
},
"product_reference": "qemu-lang-2.3.1-21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-21.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64"
},
"product_reference": "qemu-lang-2.3.1-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.3.1-21.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le"
},
"product_reference": "qemu-ppc-2.3.1-21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.3.1-21.1.s390x as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x"
},
"product_reference": "qemu-s390-2.3.1-21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.8.1-21.1.noarch as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch"
},
"product_reference": "qemu-seabios-1.8.1-21.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-21.1.noarch as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch"
},
"product_reference": "qemu-sgabios-8-21.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-21.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le"
},
"product_reference": "qemu-tools-2.3.1-21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-21.1.s390x as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x"
},
"product_reference": "qemu-tools-2.3.1-21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-21.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64"
},
"product_reference": "qemu-tools-2.3.1-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.8.1-21.1.noarch as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch"
},
"product_reference": "qemu-vgabios-1.8.1-21.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.3.1-21.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
},
"product_reference": "qemu-x86-2.3.1-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le"
},
"product_reference": "qemu-2.3.1-21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x"
},
"product_reference": "qemu-2.3.1-21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64"
},
"product_reference": "qemu-2.3.1-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le"
},
"product_reference": "qemu-block-curl-2.3.1-21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x"
},
"product_reference": "qemu-block-curl-2.3.1-21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64"
},
"product_reference": "qemu-block-curl-2.3.1-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.3.1-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.3.1-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le"
},
"product_reference": "qemu-guest-agent-2.3.1-21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x"
},
"product_reference": "qemu-guest-agent-2.3.1-21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.3.1-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-21.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.3.1-21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x"
},
"product_reference": "qemu-kvm-2.3.1-21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.3.1-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64"
},
"product_reference": "qemu-kvm-2.3.1-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le"
},
"product_reference": "qemu-lang-2.3.1-21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x"
},
"product_reference": "qemu-lang-2.3.1-21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64"
},
"product_reference": "qemu-lang-2.3.1-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.3.1-21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le"
},
"product_reference": "qemu-ppc-2.3.1-21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.3.1-21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x"
},
"product_reference": "qemu-s390-2.3.1-21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.8.1-21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch"
},
"product_reference": "qemu-seabios-1.8.1-21.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch"
},
"product_reference": "qemu-sgabios-8-21.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le"
},
"product_reference": "qemu-tools-2.3.1-21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x"
},
"product_reference": "qemu-tools-2.3.1-21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64"
},
"product_reference": "qemu-tools-2.3.1-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.8.1-21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch"
},
"product_reference": "qemu-vgabios-1.8.1-21.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.3.1-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
},
"product_reference": "qemu-x86-2.3.1-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-2391",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2391"
}
],
"notes": [
{
"category": "general",
"text": "The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2391",
"url": "https://www.suse.com/security/cve/CVE-2016-2391"
},
{
"category": "external",
"summary": "SUSE Bug 967012 for CVE-2016-2391",
"url": "https://bugzilla.suse.com/967012"
},
{
"category": "external",
"summary": "SUSE Bug 967013 for CVE-2016-2391",
"url": "https://bugzilla.suse.com/967013"
},
{
"category": "external",
"summary": "SUSE Bug 967101 for CVE-2016-2391",
"url": "https://bugzilla.suse.com/967101"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-21T13:19:52Z",
"details": "low"
}
],
"title": "CVE-2016-2391"
},
{
"cve": "CVE-2016-2392",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2392"
}
],
"notes": [
{
"category": "general",
"text": "The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 does not properly validate USB configuration descriptor objects, which allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2392",
"url": "https://www.suse.com/security/cve/CVE-2016-2392"
},
{
"category": "external",
"summary": "SUSE Bug 967012 for CVE-2016-2392",
"url": "https://bugzilla.suse.com/967012"
},
{
"category": "external",
"summary": "SUSE Bug 967090 for CVE-2016-2392",
"url": "https://bugzilla.suse.com/967090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-21T13:19:52Z",
"details": "low"
}
],
"title": "CVE-2016-2392"
},
{
"cve": "CVE-2016-4453",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4453"
}
],
"notes": [
{
"category": "general",
"text": "The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4453",
"url": "https://www.suse.com/security/cve/CVE-2016-4453"
},
{
"category": "external",
"summary": "SUSE Bug 982223 for CVE-2016-4453",
"url": "https://bugzilla.suse.com/982223"
},
{
"category": "external",
"summary": "SUSE Bug 982225 for CVE-2016-4453",
"url": "https://bugzilla.suse.com/982225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-21T13:19:52Z",
"details": "low"
}
],
"title": "CVE-2016-4453"
},
{
"cve": "CVE-2016-4454",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4454"
}
],
"notes": [
{
"category": "general",
"text": "The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4454",
"url": "https://www.suse.com/security/cve/CVE-2016-4454"
},
{
"category": "external",
"summary": "SUSE Bug 982222 for CVE-2016-4454",
"url": "https://bugzilla.suse.com/982222"
},
{
"category": "external",
"summary": "SUSE Bug 982224 for CVE-2016-4454",
"url": "https://bugzilla.suse.com/982224"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-21T13:19:52Z",
"details": "low"
}
],
"title": "CVE-2016-4454"
},
{
"cve": "CVE-2016-5105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5105"
}
],
"notes": [
{
"category": "general",
"text": "The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, uses an uninitialized variable, which allows local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5105",
"url": "https://www.suse.com/security/cve/CVE-2016-5105"
},
{
"category": "external",
"summary": "SUSE Bug 982017 for CVE-2016-5105",
"url": "https://bugzilla.suse.com/982017"
},
{
"category": "external",
"summary": "SUSE Bug 982024 for CVE-2016-5105",
"url": "https://bugzilla.suse.com/982024"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-21T13:19:52Z",
"details": "low"
}
],
"title": "CVE-2016-5105"
},
{
"cve": "CVE-2016-5106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5106"
}
],
"notes": [
{
"category": "general",
"text": "The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5106",
"url": "https://www.suse.com/security/cve/CVE-2016-5106"
},
{
"category": "external",
"summary": "SUSE Bug 982018 for CVE-2016-5106",
"url": "https://bugzilla.suse.com/982018"
},
{
"category": "external",
"summary": "SUSE Bug 982025 for CVE-2016-5106",
"url": "https://bugzilla.suse.com/982025"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-21T13:19:52Z",
"details": "low"
}
],
"title": "CVE-2016-5106"
},
{
"cve": "CVE-2016-5107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5107"
}
],
"notes": [
{
"category": "general",
"text": "The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5107",
"url": "https://www.suse.com/security/cve/CVE-2016-5107"
},
{
"category": "external",
"summary": "SUSE Bug 982019 for CVE-2016-5107",
"url": "https://bugzilla.suse.com/982019"
},
{
"category": "external",
"summary": "SUSE Bug 982026 for CVE-2016-5107",
"url": "https://bugzilla.suse.com/982026"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-21T13:19:52Z",
"details": "low"
}
],
"title": "CVE-2016-5107"
},
{
"cve": "CVE-2016-5126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5126"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5126",
"url": "https://www.suse.com/security/cve/CVE-2016-5126"
},
{
"category": "external",
"summary": "SUSE Bug 982285 for CVE-2016-5126",
"url": "https://bugzilla.suse.com/982285"
},
{
"category": "external",
"summary": "SUSE Bug 982286 for CVE-2016-5126",
"url": "https://bugzilla.suse.com/982286"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-21T13:19:52Z",
"details": "low"
}
],
"title": "CVE-2016-5126"
},
{
"cve": "CVE-2016-5238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5238"
}
],
"notes": [
{
"category": "general",
"text": "The get_cmd function in hw/scsi/esp.c in QEMU might allow local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5238",
"url": "https://www.suse.com/security/cve/CVE-2016-5238"
},
{
"category": "external",
"summary": "SUSE Bug 982959 for CVE-2016-5238",
"url": "https://bugzilla.suse.com/982959"
},
{
"category": "external",
"summary": "SUSE Bug 982960 for CVE-2016-5238",
"url": "https://bugzilla.suse.com/982960"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-21T13:19:52Z",
"details": "moderate"
}
],
"title": "CVE-2016-5238"
},
{
"cve": "CVE-2016-5337",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5337"
}
],
"notes": [
{
"category": "general",
"text": "The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5337",
"url": "https://www.suse.com/security/cve/CVE-2016-5337"
},
{
"category": "external",
"summary": "SUSE Bug 983961 for CVE-2016-5337",
"url": "https://bugzilla.suse.com/983961"
},
{
"category": "external",
"summary": "SUSE Bug 983973 for CVE-2016-5337",
"url": "https://bugzilla.suse.com/983973"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-21T13:19:52Z",
"details": "low"
}
],
"title": "CVE-2016-5337"
},
{
"cve": "CVE-2016-5338",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5338"
}
],
"notes": [
{
"category": "general",
"text": "The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5338",
"url": "https://www.suse.com/security/cve/CVE-2016-5338"
},
{
"category": "external",
"summary": "SUSE Bug 983982 for CVE-2016-5338",
"url": "https://bugzilla.suse.com/983982"
},
{
"category": "external",
"summary": "SUSE Bug 983984 for CVE-2016-5338",
"url": "https://bugzilla.suse.com/983984"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-21T13:19:52Z",
"details": "low"
}
],
"title": "CVE-2016-5338"
},
{
"cve": "CVE-2016-5403",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5403"
}
],
"notes": [
{
"category": "general",
"text": "The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5403",
"url": "https://www.suse.com/security/cve/CVE-2016-5403"
},
{
"category": "external",
"summary": "SUSE Bug 990923 for CVE-2016-5403",
"url": "https://bugzilla.suse.com/990923"
},
{
"category": "external",
"summary": "SUSE Bug 991080 for CVE-2016-5403",
"url": "https://bugzilla.suse.com/991080"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-21T13:19:52Z",
"details": "low"
}
],
"title": "CVE-2016-5403"
},
{
"cve": "CVE-2016-6490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6490"
}
],
"notes": [
{
"category": "general",
"text": "The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the descriptor buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6490",
"url": "https://www.suse.com/security/cve/CVE-2016-6490"
},
{
"category": "external",
"summary": "SUSE Bug 991466 for CVE-2016-6490",
"url": "https://bugzilla.suse.com/991466"
},
{
"category": "external",
"summary": "SUSE Bug 993854 for CVE-2016-6490",
"url": "https://bugzilla.suse.com/993854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-21T13:19:52Z",
"details": "low"
}
],
"title": "CVE-2016-6490"
},
{
"cve": "CVE-2016-6833",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6833"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU instance crash) by leveraging failure to check if the device is active.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6833",
"url": "https://www.suse.com/security/cve/CVE-2016-6833"
},
{
"category": "external",
"summary": "SUSE Bug 994774 for CVE-2016-6833",
"url": "https://bugzilla.suse.com/994774"
},
{
"category": "external",
"summary": "SUSE Bug 994775 for CVE-2016-6833",
"url": "https://bugzilla.suse.com/994775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-21T13:19:52Z",
"details": "moderate"
}
],
"title": "CVE-2016-6833"
},
{
"cve": "CVE-2016-6836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6836"
}
],
"notes": [
{
"category": "general",
"text": "The vmxnet3_complete_packet function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host memory information by leveraging failure to initialize the txcq_descr object.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6836",
"url": "https://www.suse.com/security/cve/CVE-2016-6836"
},
{
"category": "external",
"summary": "SUSE Bug 994760 for CVE-2016-6836",
"url": "https://bugzilla.suse.com/994760"
},
{
"category": "external",
"summary": "SUSE Bug 994761 for CVE-2016-6836",
"url": "https://bugzilla.suse.com/994761"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-21T13:19:52Z",
"details": "low"
}
],
"title": "CVE-2016-6836"
},
{
"cve": "CVE-2016-6888",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6888"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6888",
"url": "https://www.suse.com/security/cve/CVE-2016-6888"
},
{
"category": "external",
"summary": "SUSE Bug 994771 for CVE-2016-6888",
"url": "https://bugzilla.suse.com/994771"
},
{
"category": "external",
"summary": "SUSE Bug 994772 for CVE-2016-6888",
"url": "https://bugzilla.suse.com/994772"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-21T13:19:52Z",
"details": "low"
}
],
"title": "CVE-2016-6888"
},
{
"cve": "CVE-2016-7116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7116"
}
],
"notes": [
{
"category": "general",
"text": "Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7116",
"url": "https://www.suse.com/security/cve/CVE-2016-7116"
},
{
"category": "external",
"summary": "SUSE Bug 996441 for CVE-2016-7116",
"url": "https://bugzilla.suse.com/996441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-21T13:19:52Z",
"details": "low"
}
],
"title": "CVE-2016-7116"
},
{
"cve": "CVE-2016-7155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7155"
}
],
"notes": [
{
"category": "general",
"text": "hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds access or infinite loop, and QEMU process crash) via a crafted page count for descriptor rings.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7155",
"url": "https://www.suse.com/security/cve/CVE-2016-7155"
},
{
"category": "external",
"summary": "SUSE Bug 997858 for CVE-2016-7155",
"url": "https://bugzilla.suse.com/997858"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-21T13:19:52Z",
"details": "moderate"
}
],
"title": "CVE-2016-7155"
},
{
"cve": "CVE-2016-7156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7156"
}
],
"notes": [
{
"category": "general",
"text": "The pvscsi_convert_sglist function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging an incorrect cast.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7156",
"url": "https://www.suse.com/security/cve/CVE-2016-7156"
},
{
"category": "external",
"summary": "SUSE Bug 997859 for CVE-2016-7156",
"url": "https://bugzilla.suse.com/997859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:qemu-x86-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-s390-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-21T13:19:52Z",
"details": "moderate"
}
],
"title": "CVE-2016-7156"
}
]
}
SUSE-SU-2016:2628-1
Vulnerability from csaf_suse - Published: 2016-10-25 14:22 - Updated: 2016-10-25 14:22Summary
Security update for kvm
Severity
Moderate
Notes
Title of the patch: Security update for kvm
Description of the patch: kvm was updated to fix 16 security issues.
These security issues were fixed:
- CVE-2015-6815: e1000 NIC emulation support was vulnerable to an infinite loop issue. A privileged user inside guest could have used this flaw to crash the Qemu instance resulting in DoS. (bsc#944697).
- CVE-2016-2391: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers (bsc#967013).
- CVE-2016-2392: The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU did not properly validate USB configuration descriptor objects, which allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet (bsc#967012).
- CVE-2016-4453: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982223).
- CVE-2016-4454: The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read (bsc#982222).
- CVE-2016-5105: The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, used an uninitialized variable, which allowed local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982017).
- CVE-2016-5106: The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982018).
- CVE-2016-5107: The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors (bsc#982019).
- CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982285).
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982959).
- CVE-2016-5337: The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983961).
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer (bsc#983982).
- CVE-2016-5403: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion (bsc#991080).
- CVE-2016-6490: Infinite loop in the virtio framework. A privileged user inside the guest could have used this flaw to crash the Qemu instance on the host resulting in DoS (bsc#991466).
- CVE-2016-7116: Host directory sharing via Plan 9 File System(9pfs) was vulnerable to a directory/path traversal issue. A privileged user inside guest could have used this flaw to access undue files on the host (bsc#996441).
- CVE-2014-7815: The set_pixel_format function in ui/vnc.c in QEMU allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#902737).
Patchnames: slessp4-kvm-12816
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kvm",
"title": "Title of the patch"
},
{
"category": "description",
"text": "kvm was updated to fix 16 security issues.\n\nThese security issues were fixed:\n- CVE-2015-6815: e1000 NIC emulation support was vulnerable to an infinite loop issue. A privileged user inside guest could have used this flaw to crash the Qemu instance resulting in DoS. (bsc#944697).\n- CVE-2016-2391: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers (bsc#967013).\n- CVE-2016-2392: The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU did not properly validate USB configuration descriptor objects, which allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet (bsc#967012).\n- CVE-2016-4453: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982223).\n- CVE-2016-4454: The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read (bsc#982222).\n- CVE-2016-5105: The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, used an uninitialized variable, which allowed local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982017).\n- CVE-2016-5106: The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982018).\n- CVE-2016-5107: The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors (bsc#982019).\n- CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982285).\n- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982959).\n- CVE-2016-5337: The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983961).\n- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer (bsc#983982).\n- CVE-2016-5403: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion (bsc#991080).\n- CVE-2016-6490: Infinite loop in the virtio framework. A privileged user inside the guest could have used this flaw to crash the Qemu instance on the host resulting in DoS (bsc#991466).\n- CVE-2016-7116: Host directory sharing via Plan 9 File System(9pfs) was vulnerable to a directory/path traversal issue. A privileged user inside guest could have used this flaw to access undue files on the host (bsc#996441).\n- CVE-2014-7815: The set_pixel_format function in ui/vnc.c in QEMU allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#902737).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "slessp4-kvm-12816",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2628-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:2628-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162628-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:2628-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html"
},
{
"category": "self",
"summary": "SUSE Bug 902737",
"url": "https://bugzilla.suse.com/902737"
},
{
"category": "self",
"summary": "SUSE Bug 944697",
"url": "https://bugzilla.suse.com/944697"
},
{
"category": "self",
"summary": "SUSE Bug 967012",
"url": "https://bugzilla.suse.com/967012"
},
{
"category": "self",
"summary": "SUSE Bug 967013",
"url": "https://bugzilla.suse.com/967013"
},
{
"category": "self",
"summary": "SUSE Bug 982017",
"url": "https://bugzilla.suse.com/982017"
},
{
"category": "self",
"summary": "SUSE Bug 982018",
"url": "https://bugzilla.suse.com/982018"
},
{
"category": "self",
"summary": "SUSE Bug 982019",
"url": "https://bugzilla.suse.com/982019"
},
{
"category": "self",
"summary": "SUSE Bug 982222",
"url": "https://bugzilla.suse.com/982222"
},
{
"category": "self",
"summary": "SUSE Bug 982223",
"url": "https://bugzilla.suse.com/982223"
},
{
"category": "self",
"summary": "SUSE Bug 982285",
"url": "https://bugzilla.suse.com/982285"
},
{
"category": "self",
"summary": "SUSE Bug 982959",
"url": "https://bugzilla.suse.com/982959"
},
{
"category": "self",
"summary": "SUSE Bug 983961",
"url": "https://bugzilla.suse.com/983961"
},
{
"category": "self",
"summary": "SUSE Bug 983982",
"url": "https://bugzilla.suse.com/983982"
},
{
"category": "self",
"summary": "SUSE Bug 991080",
"url": "https://bugzilla.suse.com/991080"
},
{
"category": "self",
"summary": "SUSE Bug 991466",
"url": "https://bugzilla.suse.com/991466"
},
{
"category": "self",
"summary": "SUSE Bug 996441",
"url": "https://bugzilla.suse.com/996441"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-7815 page",
"url": "https://www.suse.com/security/cve/CVE-2014-7815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-6815 page",
"url": "https://www.suse.com/security/cve/CVE-2015-6815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2391 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2391/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2392 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2392/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4453 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4453/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4454 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4454/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5105 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5106 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5107 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5126 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5238 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5337 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5337/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5338 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5338/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5403 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5403/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6490 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7116 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7116/"
}
],
"title": "Security update for kvm",
"tracking": {
"current_release_date": "2016-10-25T14:22:27Z",
"generator": {
"date": "2016-10-25T14:22:27Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:2628-1",
"initial_release_date": "2016-10-25T14:22:27Z",
"revision_history": [
{
"date": "2016-10-25T14:22:27Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-47.1.i586",
"product": {
"name": "kvm-1.4.2-47.1.i586",
"product_id": "kvm-1.4.2-47.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-47.1.s390x",
"product": {
"name": "kvm-1.4.2-47.1.s390x",
"product_id": "kvm-1.4.2-47.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-47.1.x86_64",
"product": {
"name": "kvm-1.4.2-47.1.x86_64",
"product_id": "kvm-1.4.2-47.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-47.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586"
},
"product_reference": "kvm-1.4.2-47.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-47.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x"
},
"product_reference": "kvm-1.4.2-47.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-47.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64"
},
"product_reference": "kvm-1.4.2-47.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-47.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586"
},
"product_reference": "kvm-1.4.2-47.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-47.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x"
},
"product_reference": "kvm-1.4.2-47.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
},
"product_reference": "kvm-1.4.2-47.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-7815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-7815"
}
],
"notes": [
{
"category": "general",
"text": "The set_pixel_format function in ui/vnc.c in QEMU allows remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-7815",
"url": "https://www.suse.com/security/cve/CVE-2014-7815"
},
{
"category": "external",
"summary": "SUSE Bug 902737 for CVE-2014-7815",
"url": "https://bugzilla.suse.com/902737"
},
{
"category": "external",
"summary": "SUSE Bug 962627 for CVE-2014-7815",
"url": "https://bugzilla.suse.com/962627"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T14:22:27Z",
"details": "moderate"
}
],
"title": "CVE-2014-7815"
},
{
"cve": "CVE-2015-6815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-6815"
}
],
"notes": [
{
"category": "general",
"text": "The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-6815",
"url": "https://www.suse.com/security/cve/CVE-2015-6815"
},
{
"category": "external",
"summary": "SUSE Bug 944697 for CVE-2015-6815",
"url": "https://bugzilla.suse.com/944697"
},
{
"category": "external",
"summary": "SUSE Bug 950367 for CVE-2015-6815",
"url": "https://bugzilla.suse.com/950367"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T14:22:27Z",
"details": "low"
}
],
"title": "CVE-2015-6815"
},
{
"cve": "CVE-2016-2391",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2391"
}
],
"notes": [
{
"category": "general",
"text": "The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2391",
"url": "https://www.suse.com/security/cve/CVE-2016-2391"
},
{
"category": "external",
"summary": "SUSE Bug 967012 for CVE-2016-2391",
"url": "https://bugzilla.suse.com/967012"
},
{
"category": "external",
"summary": "SUSE Bug 967013 for CVE-2016-2391",
"url": "https://bugzilla.suse.com/967013"
},
{
"category": "external",
"summary": "SUSE Bug 967101 for CVE-2016-2391",
"url": "https://bugzilla.suse.com/967101"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T14:22:27Z",
"details": "low"
}
],
"title": "CVE-2016-2391"
},
{
"cve": "CVE-2016-2392",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2392"
}
],
"notes": [
{
"category": "general",
"text": "The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 does not properly validate USB configuration descriptor objects, which allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2392",
"url": "https://www.suse.com/security/cve/CVE-2016-2392"
},
{
"category": "external",
"summary": "SUSE Bug 967012 for CVE-2016-2392",
"url": "https://bugzilla.suse.com/967012"
},
{
"category": "external",
"summary": "SUSE Bug 967090 for CVE-2016-2392",
"url": "https://bugzilla.suse.com/967090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T14:22:27Z",
"details": "low"
}
],
"title": "CVE-2016-2392"
},
{
"cve": "CVE-2016-4453",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4453"
}
],
"notes": [
{
"category": "general",
"text": "The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4453",
"url": "https://www.suse.com/security/cve/CVE-2016-4453"
},
{
"category": "external",
"summary": "SUSE Bug 982223 for CVE-2016-4453",
"url": "https://bugzilla.suse.com/982223"
},
{
"category": "external",
"summary": "SUSE Bug 982225 for CVE-2016-4453",
"url": "https://bugzilla.suse.com/982225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T14:22:27Z",
"details": "low"
}
],
"title": "CVE-2016-4453"
},
{
"cve": "CVE-2016-4454",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4454"
}
],
"notes": [
{
"category": "general",
"text": "The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4454",
"url": "https://www.suse.com/security/cve/CVE-2016-4454"
},
{
"category": "external",
"summary": "SUSE Bug 982222 for CVE-2016-4454",
"url": "https://bugzilla.suse.com/982222"
},
{
"category": "external",
"summary": "SUSE Bug 982224 for CVE-2016-4454",
"url": "https://bugzilla.suse.com/982224"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T14:22:27Z",
"details": "low"
}
],
"title": "CVE-2016-4454"
},
{
"cve": "CVE-2016-5105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5105"
}
],
"notes": [
{
"category": "general",
"text": "The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, uses an uninitialized variable, which allows local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5105",
"url": "https://www.suse.com/security/cve/CVE-2016-5105"
},
{
"category": "external",
"summary": "SUSE Bug 982017 for CVE-2016-5105",
"url": "https://bugzilla.suse.com/982017"
},
{
"category": "external",
"summary": "SUSE Bug 982024 for CVE-2016-5105",
"url": "https://bugzilla.suse.com/982024"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T14:22:27Z",
"details": "low"
}
],
"title": "CVE-2016-5105"
},
{
"cve": "CVE-2016-5106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5106"
}
],
"notes": [
{
"category": "general",
"text": "The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5106",
"url": "https://www.suse.com/security/cve/CVE-2016-5106"
},
{
"category": "external",
"summary": "SUSE Bug 982018 for CVE-2016-5106",
"url": "https://bugzilla.suse.com/982018"
},
{
"category": "external",
"summary": "SUSE Bug 982025 for CVE-2016-5106",
"url": "https://bugzilla.suse.com/982025"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T14:22:27Z",
"details": "low"
}
],
"title": "CVE-2016-5106"
},
{
"cve": "CVE-2016-5107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5107"
}
],
"notes": [
{
"category": "general",
"text": "The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5107",
"url": "https://www.suse.com/security/cve/CVE-2016-5107"
},
{
"category": "external",
"summary": "SUSE Bug 982019 for CVE-2016-5107",
"url": "https://bugzilla.suse.com/982019"
},
{
"category": "external",
"summary": "SUSE Bug 982026 for CVE-2016-5107",
"url": "https://bugzilla.suse.com/982026"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T14:22:27Z",
"details": "low"
}
],
"title": "CVE-2016-5107"
},
{
"cve": "CVE-2016-5126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5126"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5126",
"url": "https://www.suse.com/security/cve/CVE-2016-5126"
},
{
"category": "external",
"summary": "SUSE Bug 982285 for CVE-2016-5126",
"url": "https://bugzilla.suse.com/982285"
},
{
"category": "external",
"summary": "SUSE Bug 982286 for CVE-2016-5126",
"url": "https://bugzilla.suse.com/982286"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T14:22:27Z",
"details": "low"
}
],
"title": "CVE-2016-5126"
},
{
"cve": "CVE-2016-5238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5238"
}
],
"notes": [
{
"category": "general",
"text": "The get_cmd function in hw/scsi/esp.c in QEMU might allow local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5238",
"url": "https://www.suse.com/security/cve/CVE-2016-5238"
},
{
"category": "external",
"summary": "SUSE Bug 982959 for CVE-2016-5238",
"url": "https://bugzilla.suse.com/982959"
},
{
"category": "external",
"summary": "SUSE Bug 982960 for CVE-2016-5238",
"url": "https://bugzilla.suse.com/982960"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T14:22:27Z",
"details": "moderate"
}
],
"title": "CVE-2016-5238"
},
{
"cve": "CVE-2016-5337",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5337"
}
],
"notes": [
{
"category": "general",
"text": "The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5337",
"url": "https://www.suse.com/security/cve/CVE-2016-5337"
},
{
"category": "external",
"summary": "SUSE Bug 983961 for CVE-2016-5337",
"url": "https://bugzilla.suse.com/983961"
},
{
"category": "external",
"summary": "SUSE Bug 983973 for CVE-2016-5337",
"url": "https://bugzilla.suse.com/983973"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T14:22:27Z",
"details": "low"
}
],
"title": "CVE-2016-5337"
},
{
"cve": "CVE-2016-5338",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5338"
}
],
"notes": [
{
"category": "general",
"text": "The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5338",
"url": "https://www.suse.com/security/cve/CVE-2016-5338"
},
{
"category": "external",
"summary": "SUSE Bug 983982 for CVE-2016-5338",
"url": "https://bugzilla.suse.com/983982"
},
{
"category": "external",
"summary": "SUSE Bug 983984 for CVE-2016-5338",
"url": "https://bugzilla.suse.com/983984"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T14:22:27Z",
"details": "low"
}
],
"title": "CVE-2016-5338"
},
{
"cve": "CVE-2016-5403",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5403"
}
],
"notes": [
{
"category": "general",
"text": "The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5403",
"url": "https://www.suse.com/security/cve/CVE-2016-5403"
},
{
"category": "external",
"summary": "SUSE Bug 990923 for CVE-2016-5403",
"url": "https://bugzilla.suse.com/990923"
},
{
"category": "external",
"summary": "SUSE Bug 991080 for CVE-2016-5403",
"url": "https://bugzilla.suse.com/991080"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T14:22:27Z",
"details": "low"
}
],
"title": "CVE-2016-5403"
},
{
"cve": "CVE-2016-6490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6490"
}
],
"notes": [
{
"category": "general",
"text": "The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the descriptor buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6490",
"url": "https://www.suse.com/security/cve/CVE-2016-6490"
},
{
"category": "external",
"summary": "SUSE Bug 991466 for CVE-2016-6490",
"url": "https://bugzilla.suse.com/991466"
},
{
"category": "external",
"summary": "SUSE Bug 993854 for CVE-2016-6490",
"url": "https://bugzilla.suse.com/993854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T14:22:27Z",
"details": "low"
}
],
"title": "CVE-2016-6490"
},
{
"cve": "CVE-2016-7116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7116"
}
],
"notes": [
{
"category": "general",
"text": "Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7116",
"url": "https://www.suse.com/security/cve/CVE-2016-7116"
},
{
"category": "external",
"summary": "SUSE Bug 996441 for CVE-2016-7116",
"url": "https://bugzilla.suse.com/996441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-47.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-47.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T14:22:27Z",
"details": "low"
}
],
"title": "CVE-2016-7116"
}
]
}
SUSE-SU-2016:2781-1
Vulnerability from csaf_suse - Published: 2016-11-12 03:12 - Updated: 2016-11-12 03:12Summary
Security update for qemu
Severity
Moderate
Notes
Title of the patch: Security update for qemu
Description of the patch: qemu was updated to fix 21 security issues.
These security issues were fixed:
- CVE-2014-5388: Off-by-one error in the pci_read function in the ACPI PCI hotplug interface (hw/acpi/pcihp.c) in QEMU allowed local guest users to obtain sensitive information and have other unspecified impact related to a crafted PCI device that triggers memory corruption (bsc#893323).
- CVE-2015-6815: e1000 NIC emulation support was vulnerable to an infinite loop issue. A privileged user inside guest could have used this flaw to crash the Qemu instance resulting in DoS. (bsc#944697).
- CVE-2016-2391: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers (bsc#967013).
- CVE-2016-2392: The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU did not properly validate USB configuration descriptor objects, which allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet (bsc#967012).
- CVE-2016-4453: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982223).
- CVE-2016-4454: The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read (bsc#982222).
- CVE-2016-5105: The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, used an uninitialized variable, which allowed local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982017).
- CVE-2016-5106: The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982018).
- CVE-2016-5107: The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors (bsc#982019).
- CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982285).
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982959).
- CVE-2016-5337: The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983961).
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer (bsc#983982).
- CVE-2016-5403: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion (bsc#991080).
- CVE-2016-6490: Infinite loop in the virtio framework. A privileged user inside the guest could have used this flaw to crash the Qemu instance on the host resulting in DoS (bsc#991466).
- CVE-2016-6833: Use-after-free issue in the VMWARE VMXNET3 NIC device support. A privileged user inside guest could have used this issue to crash the Qemu instance resulting in DoS (bsc#994774).
- CVE-2016-6836: VMWARE VMXNET3 NIC device support was leaging information leakage. A privileged user inside guest could have used this to leak host memory bytes to a guest (bsc#994760).
- CVE-2016-6888: Integer overflow in packet initialisation in VMXNET3 device driver. A privileged user inside guest could have used this flaw to crash the Qemu instance resulting in DoS (bsc#994771).
- CVE-2016-7116: Host directory sharing via Plan 9 File System(9pfs) was vulnerable to a directory/path traversal issue. A privileged user inside guest could have used this flaw to access undue files on the host (bsc#996441).
- CVE-2016-7155: In the VMWARE PVSCSI paravirtual SCSI bus a OOB access and/or infinite loop issue could have allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#997858).
- CVE-2016-7156: In the VMWARE PVSCSI paravirtual SCSI bus a infinite loop issue could have allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#997859).
Patchnames: SUSE-SLE-SAP-12-2016-1646,SUSE-SLE-SERVER-12-2016-1646
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "qemu was updated to fix 21 security issues.\n\nThese security issues were fixed:\n- CVE-2014-5388: Off-by-one error in the pci_read function in the ACPI PCI hotplug interface (hw/acpi/pcihp.c) in QEMU allowed local guest users to obtain sensitive information and have other unspecified impact related to a crafted PCI device that triggers memory corruption (bsc#893323).\n- CVE-2015-6815: e1000 NIC emulation support was vulnerable to an infinite loop issue. A privileged user inside guest could have used this flaw to crash the Qemu instance resulting in DoS. (bsc#944697).\n- CVE-2016-2391: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers (bsc#967013).\n- CVE-2016-2392: The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU did not properly validate USB configuration descriptor objects, which allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet (bsc#967012).\n- CVE-2016-4453: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982223).\n- CVE-2016-4454: The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read (bsc#982222).\n- CVE-2016-5105: The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, used an uninitialized variable, which allowed local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982017).\n- CVE-2016-5106: The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982018).\n- CVE-2016-5107: The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors (bsc#982019).\n- CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982285).\n- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982959).\n- CVE-2016-5337: The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983961).\n- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer (bsc#983982).\n- CVE-2016-5403: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion (bsc#991080).\n- CVE-2016-6490: Infinite loop in the virtio framework. A privileged user inside the guest could have used this flaw to crash the Qemu instance on the host resulting in DoS (bsc#991466).\n- CVE-2016-6833: Use-after-free issue in the VMWARE VMXNET3 NIC device support. A privileged user inside guest could have used this issue to crash the Qemu instance resulting in DoS (bsc#994774).\n- CVE-2016-6836: VMWARE VMXNET3 NIC device support was leaging information leakage. A privileged user inside guest could have used this to leak host memory bytes to a guest (bsc#994760).\n- CVE-2016-6888: Integer overflow in packet initialisation in VMXNET3 device driver. A privileged user inside guest could have used this flaw to crash the Qemu instance resulting in DoS (bsc#994771).\n- CVE-2016-7116: Host directory sharing via Plan 9 File System(9pfs) was vulnerable to a directory/path traversal issue. A privileged user inside guest could have used this flaw to access undue files on the host (bsc#996441).\n- CVE-2016-7155: In the VMWARE PVSCSI paravirtual SCSI bus a OOB access and/or infinite loop issue could have allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#997858).\n- CVE-2016-7156: In the VMWARE PVSCSI paravirtual SCSI bus a infinite loop issue could have allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#997859).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SAP-12-2016-1646,SUSE-SLE-SERVER-12-2016-1646",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2781-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:2781-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162781-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:2781-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html"
},
{
"category": "self",
"summary": "SUSE Bug 893323",
"url": "https://bugzilla.suse.com/893323"
},
{
"category": "self",
"summary": "SUSE Bug 944697",
"url": "https://bugzilla.suse.com/944697"
},
{
"category": "self",
"summary": "SUSE Bug 967012",
"url": "https://bugzilla.suse.com/967012"
},
{
"category": "self",
"summary": "SUSE Bug 967013",
"url": "https://bugzilla.suse.com/967013"
},
{
"category": "self",
"summary": "SUSE Bug 982017",
"url": "https://bugzilla.suse.com/982017"
},
{
"category": "self",
"summary": "SUSE Bug 982018",
"url": "https://bugzilla.suse.com/982018"
},
{
"category": "self",
"summary": "SUSE Bug 982019",
"url": "https://bugzilla.suse.com/982019"
},
{
"category": "self",
"summary": "SUSE Bug 982222",
"url": "https://bugzilla.suse.com/982222"
},
{
"category": "self",
"summary": "SUSE Bug 982223",
"url": "https://bugzilla.suse.com/982223"
},
{
"category": "self",
"summary": "SUSE Bug 982285",
"url": "https://bugzilla.suse.com/982285"
},
{
"category": "self",
"summary": "SUSE Bug 982959",
"url": "https://bugzilla.suse.com/982959"
},
{
"category": "self",
"summary": "SUSE Bug 983961",
"url": "https://bugzilla.suse.com/983961"
},
{
"category": "self",
"summary": "SUSE Bug 983982",
"url": "https://bugzilla.suse.com/983982"
},
{
"category": "self",
"summary": "SUSE Bug 991080",
"url": "https://bugzilla.suse.com/991080"
},
{
"category": "self",
"summary": "SUSE Bug 991466",
"url": "https://bugzilla.suse.com/991466"
},
{
"category": "self",
"summary": "SUSE Bug 994760",
"url": "https://bugzilla.suse.com/994760"
},
{
"category": "self",
"summary": "SUSE Bug 994771",
"url": "https://bugzilla.suse.com/994771"
},
{
"category": "self",
"summary": "SUSE Bug 994774",
"url": "https://bugzilla.suse.com/994774"
},
{
"category": "self",
"summary": "SUSE Bug 996441",
"url": "https://bugzilla.suse.com/996441"
},
{
"category": "self",
"summary": "SUSE Bug 997858",
"url": "https://bugzilla.suse.com/997858"
},
{
"category": "self",
"summary": "SUSE Bug 997859",
"url": "https://bugzilla.suse.com/997859"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-5388 page",
"url": "https://www.suse.com/security/cve/CVE-2014-5388/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-6815 page",
"url": "https://www.suse.com/security/cve/CVE-2015-6815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2391 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2391/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2392 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2392/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4453 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4453/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4454 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4454/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5105 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5106 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5107 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5126 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5238 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5337 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5337/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5338 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5338/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5403 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5403/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6490 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6833 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6833/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6836 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6888 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6888/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7116 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7155 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7156 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7156/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2016-11-12T03:12:32Z",
"generator": {
"date": "2016-11-12T03:12:32Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:2781-1",
"initial_release_date": "2016-11-12T03:12:32Z",
"revision_history": [
{
"date": "2016-11-12T03:12:32Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0-48.22.1.noarch",
"product": {
"name": "qemu-ipxe-1.0.0-48.22.1.noarch",
"product_id": "qemu-ipxe-1.0.0-48.22.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.7.4-48.22.1.noarch",
"product": {
"name": "qemu-seabios-1.7.4-48.22.1.noarch",
"product_id": "qemu-seabios-1.7.4-48.22.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-48.22.1.noarch",
"product": {
"name": "qemu-sgabios-8-48.22.1.noarch",
"product_id": "qemu-sgabios-8-48.22.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.7.4-48.22.1.noarch",
"product": {
"name": "qemu-vgabios-1.7.4-48.22.1.noarch",
"product_id": "qemu-vgabios-1.7.4-48.22.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.0.2-48.22.1.ppc64le",
"product": {
"name": "qemu-2.0.2-48.22.1.ppc64le",
"product_id": "qemu-2.0.2-48.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.0.2-48.22.1.ppc64le",
"product": {
"name": "qemu-block-curl-2.0.2-48.22.1.ppc64le",
"product_id": "qemu-block-curl-2.0.2-48.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"product": {
"name": "qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"product_id": "qemu-guest-agent-2.0.2-48.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.0.2-48.22.1.ppc64le",
"product": {
"name": "qemu-lang-2.0.2-48.22.1.ppc64le",
"product_id": "qemu-lang-2.0.2-48.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.0.2-48.22.1.ppc64le",
"product": {
"name": "qemu-ppc-2.0.2-48.22.1.ppc64le",
"product_id": "qemu-ppc-2.0.2-48.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.0.2-48.22.1.ppc64le",
"product": {
"name": "qemu-tools-2.0.2-48.22.1.ppc64le",
"product_id": "qemu-tools-2.0.2-48.22.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.0.2-48.22.1.s390x",
"product": {
"name": "qemu-2.0.2-48.22.1.s390x",
"product_id": "qemu-2.0.2-48.22.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.0.2-48.22.1.s390x",
"product": {
"name": "qemu-block-curl-2.0.2-48.22.1.s390x",
"product_id": "qemu-block-curl-2.0.2-48.22.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.0.2-48.22.1.s390x",
"product": {
"name": "qemu-guest-agent-2.0.2-48.22.1.s390x",
"product_id": "qemu-guest-agent-2.0.2-48.22.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.0.2-48.22.1.s390x",
"product": {
"name": "qemu-kvm-2.0.2-48.22.1.s390x",
"product_id": "qemu-kvm-2.0.2-48.22.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.0.2-48.22.1.s390x",
"product": {
"name": "qemu-lang-2.0.2-48.22.1.s390x",
"product_id": "qemu-lang-2.0.2-48.22.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.0.2-48.22.1.s390x",
"product": {
"name": "qemu-s390-2.0.2-48.22.1.s390x",
"product_id": "qemu-s390-2.0.2-48.22.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.0.2-48.22.1.s390x",
"product": {
"name": "qemu-tools-2.0.2-48.22.1.s390x",
"product_id": "qemu-tools-2.0.2-48.22.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.0.2-48.22.1.x86_64",
"product": {
"name": "qemu-2.0.2-48.22.1.x86_64",
"product_id": "qemu-2.0.2-48.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.0.2-48.22.1.x86_64",
"product": {
"name": "qemu-block-curl-2.0.2-48.22.1.x86_64",
"product_id": "qemu-block-curl-2.0.2-48.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.0.2-48.22.1.x86_64",
"product": {
"name": "qemu-block-rbd-2.0.2-48.22.1.x86_64",
"product_id": "qemu-block-rbd-2.0.2-48.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.0.2-48.22.1.x86_64",
"product": {
"name": "qemu-guest-agent-2.0.2-48.22.1.x86_64",
"product_id": "qemu-guest-agent-2.0.2-48.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.0.2-48.22.1.x86_64",
"product": {
"name": "qemu-kvm-2.0.2-48.22.1.x86_64",
"product_id": "qemu-kvm-2.0.2-48.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.0.2-48.22.1.x86_64",
"product": {
"name": "qemu-lang-2.0.2-48.22.1.x86_64",
"product_id": "qemu-lang-2.0.2-48.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.0.2-48.22.1.x86_64",
"product": {
"name": "qemu-tools-2.0.2-48.22.1.x86_64",
"product_id": "qemu-tools-2.0.2-48.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.0.2-48.22.1.x86_64",
"product": {
"name": "qemu-x86-2.0.2-48.22.1.x86_64",
"product_id": "qemu-x86-2.0.2-48.22.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.0.2-48.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64"
},
"product_reference": "qemu-2.0.2-48.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.0.2-48.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64"
},
"product_reference": "qemu-block-curl-2.0.2-48.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.0.2-48.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.0.2-48.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.0.2-48.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.0.2-48.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-48.22.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-48.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.0.2-48.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64"
},
"product_reference": "qemu-kvm-2.0.2-48.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.0.2-48.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64"
},
"product_reference": "qemu-lang-2.0.2-48.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.7.4-48.22.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch"
},
"product_reference": "qemu-seabios-1.7.4-48.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-48.22.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch"
},
"product_reference": "qemu-sgabios-8-48.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.0.2-48.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64"
},
"product_reference": "qemu-tools-2.0.2-48.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.7.4-48.22.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch"
},
"product_reference": "qemu-vgabios-1.7.4-48.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.0.2-48.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
},
"product_reference": "qemu-x86-2.0.2-48.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.0.2-48.22.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le"
},
"product_reference": "qemu-2.0.2-48.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.0.2-48.22.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x"
},
"product_reference": "qemu-2.0.2-48.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.0.2-48.22.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64"
},
"product_reference": "qemu-2.0.2-48.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.0.2-48.22.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le"
},
"product_reference": "qemu-block-curl-2.0.2-48.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.0.2-48.22.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x"
},
"product_reference": "qemu-block-curl-2.0.2-48.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.0.2-48.22.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64"
},
"product_reference": "qemu-block-curl-2.0.2-48.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.0.2-48.22.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.0.2-48.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.0.2-48.22.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le"
},
"product_reference": "qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.0.2-48.22.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x"
},
"product_reference": "qemu-guest-agent-2.0.2-48.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.0.2-48.22.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.0.2-48.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-48.22.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-48.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.0.2-48.22.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x"
},
"product_reference": "qemu-kvm-2.0.2-48.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.0.2-48.22.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64"
},
"product_reference": "qemu-kvm-2.0.2-48.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.0.2-48.22.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le"
},
"product_reference": "qemu-lang-2.0.2-48.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.0.2-48.22.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x"
},
"product_reference": "qemu-lang-2.0.2-48.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.0.2-48.22.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64"
},
"product_reference": "qemu-lang-2.0.2-48.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.0.2-48.22.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le"
},
"product_reference": "qemu-ppc-2.0.2-48.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.0.2-48.22.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x"
},
"product_reference": "qemu-s390-2.0.2-48.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.7.4-48.22.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch"
},
"product_reference": "qemu-seabios-1.7.4-48.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-48.22.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch"
},
"product_reference": "qemu-sgabios-8-48.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.0.2-48.22.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le"
},
"product_reference": "qemu-tools-2.0.2-48.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.0.2-48.22.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x"
},
"product_reference": "qemu-tools-2.0.2-48.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.0.2-48.22.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64"
},
"product_reference": "qemu-tools-2.0.2-48.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.7.4-48.22.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch"
},
"product_reference": "qemu-vgabios-1.7.4-48.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.0.2-48.22.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64"
},
"product_reference": "qemu-x86-2.0.2-48.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-5388",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-5388"
}
],
"notes": [
{
"category": "general",
"text": "Off-by-one error in the pci_read function in the ACPI PCI hotplug interface (hw/acpi/pcihp.c) in QEMU allows local guest users to obtain sensitive information and have other unspecified impact related to a crafted PCI device that triggers memory corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-5388",
"url": "https://www.suse.com/security/cve/CVE-2014-5388"
},
{
"category": "external",
"summary": "SUSE Bug 893323 for CVE-2014-5388",
"url": "https://bugzilla.suse.com/893323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-11-12T03:12:32Z",
"details": "moderate"
}
],
"title": "CVE-2014-5388"
},
{
"cve": "CVE-2015-6815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-6815"
}
],
"notes": [
{
"category": "general",
"text": "The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-6815",
"url": "https://www.suse.com/security/cve/CVE-2015-6815"
},
{
"category": "external",
"summary": "SUSE Bug 944697 for CVE-2015-6815",
"url": "https://bugzilla.suse.com/944697"
},
{
"category": "external",
"summary": "SUSE Bug 950367 for CVE-2015-6815",
"url": "https://bugzilla.suse.com/950367"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-11-12T03:12:32Z",
"details": "low"
}
],
"title": "CVE-2015-6815"
},
{
"cve": "CVE-2016-2391",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2391"
}
],
"notes": [
{
"category": "general",
"text": "The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2391",
"url": "https://www.suse.com/security/cve/CVE-2016-2391"
},
{
"category": "external",
"summary": "SUSE Bug 967012 for CVE-2016-2391",
"url": "https://bugzilla.suse.com/967012"
},
{
"category": "external",
"summary": "SUSE Bug 967013 for CVE-2016-2391",
"url": "https://bugzilla.suse.com/967013"
},
{
"category": "external",
"summary": "SUSE Bug 967101 for CVE-2016-2391",
"url": "https://bugzilla.suse.com/967101"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-11-12T03:12:32Z",
"details": "low"
}
],
"title": "CVE-2016-2391"
},
{
"cve": "CVE-2016-2392",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2392"
}
],
"notes": [
{
"category": "general",
"text": "The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 does not properly validate USB configuration descriptor objects, which allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2392",
"url": "https://www.suse.com/security/cve/CVE-2016-2392"
},
{
"category": "external",
"summary": "SUSE Bug 967012 for CVE-2016-2392",
"url": "https://bugzilla.suse.com/967012"
},
{
"category": "external",
"summary": "SUSE Bug 967090 for CVE-2016-2392",
"url": "https://bugzilla.suse.com/967090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-11-12T03:12:32Z",
"details": "low"
}
],
"title": "CVE-2016-2392"
},
{
"cve": "CVE-2016-4453",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4453"
}
],
"notes": [
{
"category": "general",
"text": "The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4453",
"url": "https://www.suse.com/security/cve/CVE-2016-4453"
},
{
"category": "external",
"summary": "SUSE Bug 982223 for CVE-2016-4453",
"url": "https://bugzilla.suse.com/982223"
},
{
"category": "external",
"summary": "SUSE Bug 982225 for CVE-2016-4453",
"url": "https://bugzilla.suse.com/982225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-11-12T03:12:32Z",
"details": "low"
}
],
"title": "CVE-2016-4453"
},
{
"cve": "CVE-2016-4454",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4454"
}
],
"notes": [
{
"category": "general",
"text": "The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4454",
"url": "https://www.suse.com/security/cve/CVE-2016-4454"
},
{
"category": "external",
"summary": "SUSE Bug 982222 for CVE-2016-4454",
"url": "https://bugzilla.suse.com/982222"
},
{
"category": "external",
"summary": "SUSE Bug 982224 for CVE-2016-4454",
"url": "https://bugzilla.suse.com/982224"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-11-12T03:12:32Z",
"details": "low"
}
],
"title": "CVE-2016-4454"
},
{
"cve": "CVE-2016-5105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5105"
}
],
"notes": [
{
"category": "general",
"text": "The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, uses an uninitialized variable, which allows local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5105",
"url": "https://www.suse.com/security/cve/CVE-2016-5105"
},
{
"category": "external",
"summary": "SUSE Bug 982017 for CVE-2016-5105",
"url": "https://bugzilla.suse.com/982017"
},
{
"category": "external",
"summary": "SUSE Bug 982024 for CVE-2016-5105",
"url": "https://bugzilla.suse.com/982024"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-11-12T03:12:32Z",
"details": "low"
}
],
"title": "CVE-2016-5105"
},
{
"cve": "CVE-2016-5106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5106"
}
],
"notes": [
{
"category": "general",
"text": "The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5106",
"url": "https://www.suse.com/security/cve/CVE-2016-5106"
},
{
"category": "external",
"summary": "SUSE Bug 982018 for CVE-2016-5106",
"url": "https://bugzilla.suse.com/982018"
},
{
"category": "external",
"summary": "SUSE Bug 982025 for CVE-2016-5106",
"url": "https://bugzilla.suse.com/982025"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-11-12T03:12:32Z",
"details": "low"
}
],
"title": "CVE-2016-5106"
},
{
"cve": "CVE-2016-5107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5107"
}
],
"notes": [
{
"category": "general",
"text": "The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5107",
"url": "https://www.suse.com/security/cve/CVE-2016-5107"
},
{
"category": "external",
"summary": "SUSE Bug 982019 for CVE-2016-5107",
"url": "https://bugzilla.suse.com/982019"
},
{
"category": "external",
"summary": "SUSE Bug 982026 for CVE-2016-5107",
"url": "https://bugzilla.suse.com/982026"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-11-12T03:12:32Z",
"details": "low"
}
],
"title": "CVE-2016-5107"
},
{
"cve": "CVE-2016-5126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5126"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5126",
"url": "https://www.suse.com/security/cve/CVE-2016-5126"
},
{
"category": "external",
"summary": "SUSE Bug 982285 for CVE-2016-5126",
"url": "https://bugzilla.suse.com/982285"
},
{
"category": "external",
"summary": "SUSE Bug 982286 for CVE-2016-5126",
"url": "https://bugzilla.suse.com/982286"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-11-12T03:12:32Z",
"details": "low"
}
],
"title": "CVE-2016-5126"
},
{
"cve": "CVE-2016-5238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5238"
}
],
"notes": [
{
"category": "general",
"text": "The get_cmd function in hw/scsi/esp.c in QEMU might allow local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5238",
"url": "https://www.suse.com/security/cve/CVE-2016-5238"
},
{
"category": "external",
"summary": "SUSE Bug 982959 for CVE-2016-5238",
"url": "https://bugzilla.suse.com/982959"
},
{
"category": "external",
"summary": "SUSE Bug 982960 for CVE-2016-5238",
"url": "https://bugzilla.suse.com/982960"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-11-12T03:12:32Z",
"details": "moderate"
}
],
"title": "CVE-2016-5238"
},
{
"cve": "CVE-2016-5337",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5337"
}
],
"notes": [
{
"category": "general",
"text": "The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5337",
"url": "https://www.suse.com/security/cve/CVE-2016-5337"
},
{
"category": "external",
"summary": "SUSE Bug 983961 for CVE-2016-5337",
"url": "https://bugzilla.suse.com/983961"
},
{
"category": "external",
"summary": "SUSE Bug 983973 for CVE-2016-5337",
"url": "https://bugzilla.suse.com/983973"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-11-12T03:12:32Z",
"details": "low"
}
],
"title": "CVE-2016-5337"
},
{
"cve": "CVE-2016-5338",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5338"
}
],
"notes": [
{
"category": "general",
"text": "The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5338",
"url": "https://www.suse.com/security/cve/CVE-2016-5338"
},
{
"category": "external",
"summary": "SUSE Bug 983982 for CVE-2016-5338",
"url": "https://bugzilla.suse.com/983982"
},
{
"category": "external",
"summary": "SUSE Bug 983984 for CVE-2016-5338",
"url": "https://bugzilla.suse.com/983984"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-11-12T03:12:32Z",
"details": "low"
}
],
"title": "CVE-2016-5338"
},
{
"cve": "CVE-2016-5403",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5403"
}
],
"notes": [
{
"category": "general",
"text": "The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5403",
"url": "https://www.suse.com/security/cve/CVE-2016-5403"
},
{
"category": "external",
"summary": "SUSE Bug 990923 for CVE-2016-5403",
"url": "https://bugzilla.suse.com/990923"
},
{
"category": "external",
"summary": "SUSE Bug 991080 for CVE-2016-5403",
"url": "https://bugzilla.suse.com/991080"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-11-12T03:12:32Z",
"details": "low"
}
],
"title": "CVE-2016-5403"
},
{
"cve": "CVE-2016-6490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6490"
}
],
"notes": [
{
"category": "general",
"text": "The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the descriptor buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6490",
"url": "https://www.suse.com/security/cve/CVE-2016-6490"
},
{
"category": "external",
"summary": "SUSE Bug 991466 for CVE-2016-6490",
"url": "https://bugzilla.suse.com/991466"
},
{
"category": "external",
"summary": "SUSE Bug 993854 for CVE-2016-6490",
"url": "https://bugzilla.suse.com/993854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-11-12T03:12:32Z",
"details": "low"
}
],
"title": "CVE-2016-6490"
},
{
"cve": "CVE-2016-6833",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6833"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU instance crash) by leveraging failure to check if the device is active.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6833",
"url": "https://www.suse.com/security/cve/CVE-2016-6833"
},
{
"category": "external",
"summary": "SUSE Bug 994774 for CVE-2016-6833",
"url": "https://bugzilla.suse.com/994774"
},
{
"category": "external",
"summary": "SUSE Bug 994775 for CVE-2016-6833",
"url": "https://bugzilla.suse.com/994775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-11-12T03:12:32Z",
"details": "moderate"
}
],
"title": "CVE-2016-6833"
},
{
"cve": "CVE-2016-6836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6836"
}
],
"notes": [
{
"category": "general",
"text": "The vmxnet3_complete_packet function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host memory information by leveraging failure to initialize the txcq_descr object.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6836",
"url": "https://www.suse.com/security/cve/CVE-2016-6836"
},
{
"category": "external",
"summary": "SUSE Bug 994760 for CVE-2016-6836",
"url": "https://bugzilla.suse.com/994760"
},
{
"category": "external",
"summary": "SUSE Bug 994761 for CVE-2016-6836",
"url": "https://bugzilla.suse.com/994761"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-11-12T03:12:32Z",
"details": "low"
}
],
"title": "CVE-2016-6836"
},
{
"cve": "CVE-2016-6888",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6888"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6888",
"url": "https://www.suse.com/security/cve/CVE-2016-6888"
},
{
"category": "external",
"summary": "SUSE Bug 994771 for CVE-2016-6888",
"url": "https://bugzilla.suse.com/994771"
},
{
"category": "external",
"summary": "SUSE Bug 994772 for CVE-2016-6888",
"url": "https://bugzilla.suse.com/994772"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-11-12T03:12:32Z",
"details": "low"
}
],
"title": "CVE-2016-6888"
},
{
"cve": "CVE-2016-7116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7116"
}
],
"notes": [
{
"category": "general",
"text": "Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7116",
"url": "https://www.suse.com/security/cve/CVE-2016-7116"
},
{
"category": "external",
"summary": "SUSE Bug 996441 for CVE-2016-7116",
"url": "https://bugzilla.suse.com/996441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-11-12T03:12:32Z",
"details": "low"
}
],
"title": "CVE-2016-7116"
},
{
"cve": "CVE-2016-7155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7155"
}
],
"notes": [
{
"category": "general",
"text": "hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds access or infinite loop, and QEMU process crash) via a crafted page count for descriptor rings.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7155",
"url": "https://www.suse.com/security/cve/CVE-2016-7155"
},
{
"category": "external",
"summary": "SUSE Bug 997858 for CVE-2016-7155",
"url": "https://bugzilla.suse.com/997858"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-11-12T03:12:32Z",
"details": "moderate"
}
],
"title": "CVE-2016-7155"
},
{
"cve": "CVE-2016-7156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7156"
}
],
"notes": [
{
"category": "general",
"text": "The pvscsi_convert_sglist function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging an incorrect cast.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7156",
"url": "https://www.suse.com/security/cve/CVE-2016-7156"
},
{
"category": "external",
"summary": "SUSE Bug 997859 for CVE-2016-7156",
"url": "https://bugzilla.suse.com/997859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-curl-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-block-rbd-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-guest-agent-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-ipxe-1.0.0-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-kvm-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-lang-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-seabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-sgabios-8-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-tools-2.0.2-48.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-vgabios-1.7.4-48.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:qemu-x86-2.0.2-48.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-11-12T03:12:32Z",
"details": "moderate"
}
],
"title": "CVE-2016-7156"
}
]
}
CNVD-2016-07194
Vulnerability from cnvd - Published: 2016-09-05
VLAI Severity ?
Title
QEMU文件处理存在目录遍历漏洞
Description
QEMU是法国程序员法布里斯-贝拉(Fabrice Bellard)所研发的一套模拟处理器软件。该软件具有速度快、跨平台等特点。
QEMU中存在目录遍历漏洞。由于程序未能充分过滤用户提交的输入。攻击者可借助目录遍历字符‘..’利用该漏洞检索任意来自受影响系统的文件,获取信息。
Severity
低
Patch Name
QEMU文件处理存在目录遍历漏洞的补丁
Patch Description
QEMU是法国程序员法布里斯-贝拉(Fabrice Bellard)所研发的一套模拟处理器软件。该软件具有速度快、跨平台等特点。
QEMU中存在目录遍历漏洞。由于程序未能充分过滤用户提交的输入。攻击者可借助目录遍历字符‘..’利用该漏洞检索任意来自受影响系统的文件,获取信息。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
目前厂商已经发布了升级补丁以修复此安全问题,详情请关注厂商主页: http://wiki.qemu.org/Index.html
Reference
http://www.securityfocus.com/bid/92680
Impacted products
| Name | QEMU QEMU 0 |
|---|
{
"bids": {
"bid": {
"bidNumber": "92680"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2016-7116"
}
},
"description": "QEMU\u662f\u6cd5\u56fd\u7a0b\u5e8f\u5458\u6cd5\u5e03\u91cc\u65af-\u8d1d\u62c9\uff08Fabrice Bellard\uff09\u6240\u7814\u53d1\u7684\u4e00\u5957\u6a21\u62df\u5904\u7406\u5668\u8f6f\u4ef6\u3002\u8be5\u8f6f\u4ef6\u5177\u6709\u901f\u5ea6\u5feb\u3001\u8de8\u5e73\u53f0\u7b49\u7279\u70b9\u3002\r\n\r\nQEMU\u4e2d\u5b58\u5728\u76ee\u5f55\u904d\u5386\u6f0f\u6d1e\u3002\u7531\u4e8e\u7a0b\u5e8f\u672a\u80fd\u5145\u5206\u8fc7\u6ee4\u7528\u6237\u63d0\u4ea4\u7684\u8f93\u5165\u3002\u653b\u51fb\u8005\u53ef\u501f\u52a9\u76ee\u5f55\u904d\u5386\u5b57\u7b26\u2018..\u2019\u5229\u7528\u8be5\u6f0f\u6d1e\u68c0\u7d22\u4efb\u610f\u6765\u81ea\u53d7\u5f71\u54cd\u7cfb\u7edf\u7684\u6587\u4ef6\uff0c\u83b7\u53d6\u4fe1\u606f\u3002",
"discovererName": "Felix Wilhelm",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8be6\u60c5\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\uff1a\r\nhttp://wiki.qemu.org/Index.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2016-07194",
"openTime": "2016-09-05",
"patchDescription": "QEMU\u662f\u6cd5\u56fd\u7a0b\u5e8f\u5458\u6cd5\u5e03\u91cc\u65af-\u8d1d\u62c9\uff08Fabrice Bellard\uff09\u6240\u7814\u53d1\u7684\u4e00\u5957\u6a21\u62df\u5904\u7406\u5668\u8f6f\u4ef6\u3002\u8be5\u8f6f\u4ef6\u5177\u6709\u901f\u5ea6\u5feb\u3001\u8de8\u5e73\u53f0\u7b49\u7279\u70b9\u3002\r\n\r\nQEMU\u4e2d\u5b58\u5728\u76ee\u5f55\u904d\u5386\u6f0f\u6d1e\u3002\u7531\u4e8e\u7a0b\u5e8f\u672a\u80fd\u5145\u5206\u8fc7\u6ee4\u7528\u6237\u63d0\u4ea4\u7684\u8f93\u5165\u3002\u653b\u51fb\u8005\u53ef\u501f\u52a9\u76ee\u5f55\u904d\u5386\u5b57\u7b26\u2018..\u2019\u5229\u7528\u8be5\u6f0f\u6d1e\u68c0\u7d22\u4efb\u610f\u6765\u81ea\u53d7\u5f71\u54cd\u7cfb\u7edf\u7684\u6587\u4ef6\uff0c\u83b7\u53d6\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "QEMU\u6587\u4ef6\u5904\u7406\u5b58\u5728\u76ee\u5f55\u904d\u5386\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "QEMU QEMU 0"
},
"referenceLink": "http://www.securityfocus.com/bid/92680",
"serverity": "\u4f4e",
"submitTime": "2016-09-05",
"title": "QEMU\u6587\u4ef6\u5904\u7406\u5b58\u5728\u76ee\u5f55\u904d\u5386\u6f0f\u6d1e"
}
GHSA-X8XQ-JR3X-4WJR
Vulnerability from github – Published: 2022-05-13 01:14 – Updated: 2022-05-13 01:14
VLAI?
Details
Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string.
Severity ?
6.0 (Medium)
{
"affected": [],
"aliases": [
"CVE-2016-7116"
],
"database_specific": {
"cwe_ids": [
"CWE-22"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2016-12-10T00:59:00Z",
"severity": "MODERATE"
},
"details": "Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string.",
"id": "GHSA-x8xq-jr3x-4wjr",
"modified": "2022-05-13T01:14:35Z",
"published": "2022-05-13T01:14:35Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7116"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
},
{
"type": "WEB",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03917.html"
},
{
"type": "WEB",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04231.html"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201609-01"
},
{
"type": "WEB",
"url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=56f101ecce0eafd09e2daf1c4eeb1377d6959261"
},
{
"type": "WEB",
"url": "http://git.qemu.org/?p=qemu.git;a=commit;h=56f101ecce0eafd09e2daf1c4eeb1377d6959261"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2016/08/30/1"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2016/08/30/3"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/92680"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2016-7116
Vulnerability from fkie_nvd - Published: 2016-12-10 00:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string.
References
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=56f101ecce0eafd09e2daf1c4eeb1377d6959261 | ||
| secalert@redhat.com | http://www.openwall.com/lists/oss-security/2016/08/30/1 | Mailing List, Third Party Advisory | |
| secalert@redhat.com | http://www.openwall.com/lists/oss-security/2016/08/30/3 | Mailing List, Third Party Advisory | |
| secalert@redhat.com | http://www.securityfocus.com/bid/92680 | Third Party Advisory, VDB Entry | |
| secalert@redhat.com | https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html | Mailing List, Third Party Advisory | |
| secalert@redhat.com | https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03917.html | Third Party Advisory | |
| secalert@redhat.com | https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04231.html | Third Party Advisory | |
| secalert@redhat.com | https://security.gentoo.org/glsa/201609-01 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=56f101ecce0eafd09e2daf1c4eeb1377d6959261 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/08/30/1 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/08/30/3 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/92680 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03917.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04231.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201609-01 | Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3CF78B06-34D3-4BF8-883B-7B9643BBA7CE",
"versionEndIncluding": "2.6.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qemu:qemu:2.7.0:rc0:*:*:*:*:*:*",
"matchCriteriaId": "FA78F261-DEB3-46D5-9998-106F6210755E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qemu:qemu:2.7.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "F121048B-9387-40C6-A919-7F9A4A847EA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qemu:qemu:2.7.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "7A102329-A5FB-4B9C-9094-BDA595807A56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qemu:qemu:2.7.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "21153B03-A177-46BD-8197-3397C365D418",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qemu:qemu:2.7.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "9E7398D7-A9ED-4C75-A048-475EF4088E3B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string."
},
{
"lang": "es",
"value": "Vulnerabilidad de salto de directorio en hw/9pfs/9p.c en QEMU (tambi\u00e9n conocido como Quick Emulator) permite a administradores locales del SO invitado acceder a los archivos del host fuera de la ruta de exportaci\u00f3n a trav\u00e9s de un .. (punto punto) en una cadena no especificada."
}
],
"id": "CVE-2016-7116",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.5,
"impactScore": 4.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2016-12-10T00:59:10.637",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=56f101ecce0eafd09e2daf1c4eeb1377d6959261"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/08/30/1"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/08/30/3"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/92680"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03917.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04231.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201609-01"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=56f101ecce0eafd09e2daf1c4eeb1377d6959261"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/08/30/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/08/30/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/92680"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03917.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04231.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201609-01"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2016-7116
Vulnerability from gsd - Updated: 2023-12-13 01:21Details
Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2016-7116",
"description": "Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string.",
"id": "GSD-2016-7116",
"references": [
"https://www.suse.com/security/cve/CVE-2016-7116.html",
"https://ubuntu.com/security/CVE-2016-7116"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2016-7116"
],
"details": "Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string.",
"id": "GSD-2016-7116",
"modified": "2023-12-13T01:21:20.709910Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-7116",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html",
"refsource": "MISC",
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
},
{
"name": "https://security.gentoo.org/glsa/201609-01",
"refsource": "MISC",
"url": "https://security.gentoo.org/glsa/201609-01"
},
{
"name": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=56f101ecce0eafd09e2daf1c4eeb1377d6959261",
"refsource": "MISC",
"url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=56f101ecce0eafd09e2daf1c4eeb1377d6959261"
},
{
"name": "http://www.openwall.com/lists/oss-security/2016/08/30/1",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2016/08/30/1"
},
{
"name": "http://www.openwall.com/lists/oss-security/2016/08/30/3",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2016/08/30/3"
},
{
"name": "http://www.securityfocus.com/bid/92680",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/92680"
},
{
"name": "https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03917.html",
"refsource": "MISC",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03917.html"
},
{
"name": "https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04231.html",
"refsource": "MISC",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04231.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:qemu:qemu:2.7.0:rc0:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.6.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:qemu:qemu:2.7.0:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:qemu:qemu:2.7.0:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:qemu:qemu:2.7.0:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:qemu:qemu:2.7.0:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-7116"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[qemu-devel] 20160826 [PATCH v2 0/5] 9P security fixes",
"refsource": "MLIST",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03917.html"
},
{
"name": "[qemu-devel] 20160830 [PATCH v4 0/3] 9pfs security fixes",
"refsource": "MLIST",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04231.html"
},
{
"name": "[oss-security] 20160830 CVE request: Qemu: 9p: directory traversal flaw in 9p virtio backend",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/08/30/1"
},
{
"name": "[oss-security] 20160830 Re: CVE request: Qemu: 9p: directory traversal flaw in 9p virtio backend",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/08/30/3"
},
{
"name": "92680",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/92680"
},
{
"name": "GLSA-201609-01",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201609-01"
},
{
"name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
},
{
"name": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=56f101ecce0eafd09e2daf1c4eeb1377d6959261",
"refsource": "MISC",
"tags": [],
"url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=56f101ecce0eafd09e2daf1c4eeb1377d6959261"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.5,
"impactScore": 4.0
}
},
"lastModifiedDate": "2023-02-12T23:25Z",
"publishedDate": "2016-12-10T00:59Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…